Hacking Research Paper

Topics: Computer security, Access control, Information security Pages: 4 (1378 words) Published: April 17, 2013

Throughout my path to obtaining a degree in Cybersecurity I have learned quit a bit. It has enabled me to acquire the CompTIA Network + certification, as well as the CompTIA Security +. In taking this course, I just knew I would learn some new and fascinating things about how to defend my network. What better way to do so, than to think like a criminal? Though I have learned some interesting techniques, such as the use of sniffers like Wireshark or NIDS software like Tripwire, it seems that the basic fundamentals are always the same. Through the plethora of tools available for hacking a system and preventing attack, you are mostly safeguarding three main vectors of information security. The enemy is solely concerned with attacking the confidentiality, availability and integrity (CIA) of your information and information systems. So, I felt it was best to stick to the basics. There is no way to prevent all of the ways of hacking a system, but you must understand the attackers aim. As I have gone through this class, I have asked myself the same question continuously, what are they after? When you can begin to understand whether they are there to steal information, modify or delete, or merely disrupt the information process, you can begin to defend your network against these attacks. The array of software and hardware tools out there to hack a system or protect the network will change with the sophistication of systems in the future, but the fundamentals will remain. Reconnaissance; know what vector your enemy may be interested in, confidentiality, integrity or availability are their targets. Are you protected? Confidentiality, integrity, and availability of your systems are of extreme importance. Confidentiality of the data within your network is the thriving force of business. This data is pertinent to the company and consumer. The information could possibly entail financial records or even identifying information. All of which, if found in the wrong...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Android Hacking and Security Research Paper
  • Research Paper
  • Research paper
  • Research Paper
  • Research Paper
  • Research Paper
  • Hacking Research Paper
  • Research Paper

Become a StudyMode Member

Sign Up - It's Free