... engineering-based, 18 8 19 5, 212 timing of, 17 3 17 4Trojan horses, 18 –20, 10 8, 11 1 11 4,289–290Unicode exploit, 18 4 18 5, 18 6 18 7viruses. See virusesworms, 20–22hackers, 3–4, 16 8 16 9black hat, 3cloaking ... 87AWTPermission, Java, 280Bback door attacks, 19 5 19 8, 212 – 213 Back Orifice 2000 (BO2K), 18 19 , 10 8overview of, 11 1 11 4tools for detecting, 11 5 11 8back-out plans, importance of, 489, 498background ... searchengines, 17 3, 17 9 18 0general strategies for preventing, 31 34levels of damage inflicted by, 17 6 17 7scanning for network weaknesses, 17 1 17 2, 17 3, 18 0 18 2hacking toolsdebuggers, 16 9, 2 01 202disassemblers,...