Preview

IT security

Satisfactory Essays
Open Document
Open Document
43660 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT security
Ethical H acking a n d C o u n te rm e a s u re s
R efe re n c e s

Exam 3 1 2 -5 0 C ertified Ethical H acker

M odule 01: Introduction to Ethical Hacking
1.

Zero-day attacks are meaner, more rampant than we ever thought, from http://arstechnica.com /security/ 2012/ 10 /zero-day-attacks-are-meaner-and-more-plentiful-thanthought/.

2.

SECURITY POLICY: TARGET, CONTENT, & LINKS, from http://csrc.nist.gov/nissc/1998/proceedings/paperG4.pdf. 3.

Anatomy of the Hack - Hands-on Security, from http://w ww.slideshare.net/NewBU/anatom y-of-thehack-handson-security-information-assurance-dub.

4.

Hacker methodology, from http://www.hackersecuritymeasures.com /.

5.

Ethical Hacking, from www.securedeath.com.

6.

C. C. Palmer, Ethical hacking from http://researchweb.w atson.ibm .com /journal/sj/403/palm er.htm l.

7.

An Overview of Computer Security, from www.cc.gatech.edu/classes/AY2005/cs4803cns_fall/security_overview.ppt. 8.

Dr. Death, (2006), Ethical Hacking, from http://w w w .securedeath.com .

9.

Ethical Hacking, from http://new order.box.sk/new s/921.

10.

How are Penetrating Testing conducted?, from www.corsaire.com.

11.

Ethical Hacking: The Security Justification Redux, from http://www.sosresearch.org/publications/ISTAS02ethicalhack.PDF. 12.

Ethical Hacking, from www.sosresearch.org/publications.

13.

Ethical Hacking, from www.research.ibm.com.

14.

Covering Tracks, from h ttp ://ro o tp ro m p t.o rg .

15.

Attack, from http://w w w .linuxsecurity.com /content/view /17/70/.

16.

Security Issues in Wireless MAGNET at Networj Layer, from http://csce.unl.edu/~jaljaroo/publications/TR02-10-07.pdf. 17.

Glossary of Security and Internet terms, from http://wssg.berkeley.edu/Securitylnfrastructure/glossary.html. 18.

Glossary of Vulnerability Testing Terminology, from http://w w w .ee.oulu.fi/research/ouspg/sage/glossary/.

19.

Information about

hackers, from h



Citations: Stephen Specht & Ruby Lee, (2003), from Taxonomies of Distributed Denial of Service Networks, Attacks ..., from David Dittrich, (1999), The DoS Project 's "trinoo" distributed denial of service attack tool from h ttp://w w w .donkboy.com /htm l/stuff.htm . David Moore Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas, (2003), Weaver Inside the Slammer Worm, from David Dittrich, (1999), Trinoo Analysis, from http://staff.washington.edu/dittrich/m isc/trinoo.analysis. John Michalski, Carrie Price, Eric Stanton, Erik Lee, CHUA, Kuan Seah, Wong, Yip Heng and TAN, and Chung Pheng, (2002), DYNAT TECHNOLOGIES ASSESSMENT REPORT, from Jason Barlow and Woody Thrower, (2000), TFN2K - An Analysis Jason Barlow and Woody Thrower AXENT Security..., from http://packetst 0 rmsecurity.0 rg/distributed/TFN 2k_Analysis-l.3 .tx t. Jason Barlow and Woody Thrower, (2000), TFN2K - An Analysis (Revision : 1.3), from http://www.sym antec.com /avcenter/security/Content/2000_02_10_a.htm l. 1100 . Gary C. Kessler, (2000), Distributed Denial-Of-Service, from http://w w w .garykessler.net/library/ddos.htm l.

You May Also Find These Documents Helpful

  • Better Essays

    This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    root causes of DDoS attacks by reducing Bots infections. Tools such as AD, SCCM, and…

    • 885 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Polstra, R. M. (2005). A case study on how to manage the theft of information. Proceedings of the 2nd annual conference on Information security curriculum development (pp. 135-138). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    Ipremier Dos Attack

    • 1479 Words
    • 6 Pages

    Lemon, J. (2002, February). Resisting SYN Flood DoS Attacks with a SYN Cache. In BSDCon (Vol. 2002, pp. 89-97).…

    • 1479 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Discussion question

    • 1527 Words
    • 7 Pages

    Screen shot of the detailed view of the 2nd infection "";"C:\Helix\IR\nirsoft\LSASecretsView.exe";"May be infected by unknown virus Win32/DH{HhMXFE8VGw}";"Moved to Virus Vault"…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Good Essays

    Criminal Justice Final

    • 1252 Words
    • 6 Pages

    * denial of service attack: extorting money from an internet service user by threatening to prevent the user from having access to the service…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Best Essays

    6. Tankard, C. (2011, August). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 1619. doi:10.1016/S1353-4858(11)70086-…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Good Essays

    While there are many threats out there today many of these threats are almost always targeted towards anything to do with business and money because they are always looking to gain free access to money sources or a way to steal things from companies or customers who have done business with them in the past. I am going to choose a local Company which is a very big store chain here in my state and a good many other states around the area, it is called Wal-Mart, they offer everything from car parts, food, pet supplies, normal supplies for daily use, electronics, clothes, just about anything you can imagine they have it and along with an online store as well to ship from other stores or to ship to homes.…

    • 1196 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R. & Murukan, A. (2003, June). Threats and countermeasures. Microsoft. Retrieved from http://msdn.microsoft.com/en-us/library/ff648641.aspx…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays