Preview

Ceh Cheat Sheet

Powerful Essays
Open Document
Open Document
3910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ceh Cheat Sheet
Footprinting

The phases of an attack

1. Reconnaissance Information gathering, physical and social engineering, locate network range 2. Scanning - Enumerating Live hosts, access points, accounts and policies, vulnerability assessment 3. Gaining Access Breech systems, plant malicious code, backdoors 4. Maintaining Access Rootkits, unpatched systems 5. Clearing Tracks IDS evasion, log manipulation, decoy traffic

Information Gathering

1. Unearth initial information What/ Who is the target? 2. Locate the network range What is the attack surface? 3. Ascertain active machines What hosts are alive? 4. Open ports / access points How can they be accessed? 5. Detect operating systems What platform are they? 6. Uncover services on ports What software can be attacked? 7. Map the network Tie it all together, document, and form a strategy.

Know the OSI model

Application | 7 | Service protocols | Presentation | 6 | Data formats | Session | 5 | Authentication, Cryptographic agreements | Transport | 4 | Ports, logical service to service connections | Network | 3 | Network to network delivery | Data Link | 2 | Host to host links, contention | Physical | 1 | Media |
LEGAL
United States

Computer fraud and abuse act Addresses hacking activities
18 U.S.C. 1029 Possession of Access Devices
18 U.S.C. 1030 Fraud and Related Activity in Conncetion with Computers

CAN-SPAM Defines legal eMail marketing SPY-Act Protects vendors monitoring for licence enforcement DMCA - Digital Milenium Copyright Act Protects intellectual property SOX - Sarbanes Oxley Controls for corporate financial processes GLBA - Gramm-Leech Bliley Act Controls use of personal financial data HIPPA - Health Imformation Portability and Protection Act Privacy for medical records FERPA - Family Educational Rights and Privacy Act Protection for education records FISMA - Federal Information Security Management Act Government networks must have security

You May Also Find These Documents Helpful

  • Good Essays

    NEHA STUDY GUIDE

    • 2196 Words
    • 8 Pages

    You come to work and find stock left in sink at room temperature, what should you do?…

    • 2196 Words
    • 8 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Hippa and Nursing

    • 963 Words
    • 4 Pages

    The protection and privacy of HIPAA (Health Insurance Portability and Accountability Act) which became law in ,1996. Subtitle F of Title II of HIPAA, entitled "Administrative Simplification, "requires the Secretary of Health and Human Services to adopt national standards for certain information- related activities of the health care industry. This law works to make the efficiency and effectiveness of the health care system by mandating the development of standards and requirements to enable the electronic exchange of certain health information. Section 262 of subtitle F added a new Part C to Title XI of the Act. Part C (42 U.S.C. 1320d - 1320d-8) requires the Secretary to adopt national transactions, such as code sets and certain unique health identifiers. Recognizing that the industry trend toward computerizing health information, which HIPAA encourages, may increase access to that information, the statute also requires national standards to protect the security and privacy of the information." The Privacy Rule is defined as "HIPAA Privacy the Protections and privacy of all health information." HIPAA.101.com: the rules, (2006, ¶HIPAA Security Rule, this rule "mandates the security of Electronic medical records (EMR). This rule addresses the technical aspects of protecting electronic health files." HIPAA.101.com: HIPAA: the rules (2006:¶ 3).…

    • 963 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The three broad objectives HIPAA privacy standards were designed to accomplish are; define and limit the circumstances in which individuals use and disclose patient health information, establish individual rights regarding patient health information, and require protected individuals to adopt administrative safeguards to protect the confidentiality and privacy of patient healthcare information (Cleverley, pg.95). The HIPAA Privacy Standards prohibit covered entities from using or disclosing individually identifiable health information that is or has been transmitted or maintained electronically. This requirement isn’t limited to the record in which the information appears but applies to the actual information itself. Any information that has been transmitted by email, fax, telephone, or any other…

    • 995 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Health Insurance Portability and Accountability (HIPAA) was established in 1996. The U.S. Department of Health and Human Services created HIPAA to protect healthcare information from being disclosed such as addresses, phone numbers, Social Security numbers, insurance information, health related information, and any other personal information. Before this privacy act was implemented healthcare providers were not required to protect their patients personal and health information which resulted in identity theft and sharing of patients healthcare records without permission. HIPAA required that all paper charts are kept in a room that has a lock on the door and if the practice uses electronic records they are required to have locks on the computers that require a username and password to log in. The software that the electronic health records (EHR) are kept on the computer is also required to have a secure log in, in order to access it.…

    • 461 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Hipaa Privacy Rule

    • 321 Words
    • 2 Pages

    Congress addressed growing public concern about privacy and security of personal health data, and in 1996 passed “The Health Insurance Portability and Accountability Act” (HIPAA). HIPAA sets the national standard for electronic transfers of health data. Before HIPAA, each state set their own standards. Now states must abide by the minimum standards set by HIPAA. States can enact laws to incorporate and strengthen the basic rights given by HIPAA. How HIPAA's Privacy Rule Protects YOU; The Patient Access to your own medical records Prior to HIPAA, access to your medical records was not guaranteed by federal law. Only about half the states had laws giving patients the right to see and copy their own medical records. You may be charged for copies but HIPAA sets fee limits. You Must Be Given Notice of Privacy Practices…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hipaa and Medical Records

    • 366 Words
    • 2 Pages

    The Health Insurance Portability and Accountability Act of 2003 changed the way that patients, practitioners and insurance companies viewed medical records. No longer would physician be able to choose the level of privacy they maintained for clients’ records. Patients became more aware of their rights and responsibilities toward their health records. This paper provides a brief synopsis of how HIPAA has affected access to medical records and its affect on medical offices and their employees.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Health Insurance Portability and Accountability act of 1996 or HIPAA, was put in place as an attempt to reform health care during the Clinton administration by making it possible for workers, of any profession, to change jobs regardless if the worker, or any member of their family, have a pre-existing medical condition, decreasing paperwork which is associated with the processing of health claims, and by reducing health care abuse and fraud, and by assuring the privacy and security of health information. HIPAA’s standards for privacy of individually identifiable health information or privacy rule includes restrictions which protect the confidentiality and security of health information, and determines a criterion to protect the confidentiality of individually identifiable health information that is maintained or transmitted through electronic means in association with certain administrative and financial transactions such as electronic transfer of health insurance claims. The covered entity, in most cases, is required to obtain an individual’s authorization prior to disclosing any health information. And in most circumstances the patient or a legal representative of the patient controls the disclosure of PHI to any third party.…

    • 1028 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The Health Insurance Portability Accountability Act (HIPAA) administers the HIPPA Privacy and Security Rules for individual’s protection of their health information. Many doctors and health care providers recognize and accept all requirements under the Security and Privacy Rules. EHR permits health care providers and doctor’s to use data efficiently in their care and to develop the superiority and effectiveness for the betterment of the patient.…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Health Care Industry

    • 614 Words
    • 3 Pages

    HIPAA laws will impact the day-to-day operations of all health care organizations that create, transmit or store data related to health care electronically. Health information regarding a patient is needed to the doctors, nurses and others so that they (patients) can be treated well. Without the authorization of the patients, no health organization can share the information related to patients with a life insurer. According to the regulations of HIPAA, a secure system, which protects the patient's information, is required by the doctors, pharmacies, health insurers and other healthcare providers. The steep increase in the paperwork that must be reviewed and signed during the first visit of the healthcare facility is the most noticeable change for the consumers of healthcare services. “Had the parties involved in the health care industry collaborated years ago to…

    • 614 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Hsm310 Hipaa Assignment

    • 893 Words
    • 4 Pages

    | HIPAA Rules(1)Privacy Rules: According to the U.S Department of Health and Human Services (HHS), the HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically. It’s important because the Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. This rule impacts the staff by: Not sharing the information with others who have no need to know, including co-workers, family members or friends, minimizing opportunities for patient information to be overheard by others, never sharing passwords, disposing of information containing PHI properly such as shredding paper files(2)Security Rules: The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule is important because it requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. It impacts the organization by forcing the healthcare industry to adopt uniform electronic transaction standards for…

    • 893 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    HIPAA is divided into five titles or categories covering different aspects of healthcare. The highlights of these five titles are (i) continuous health care insurance coverage for most people, (ii) preventing health care fraud and abuse and protecting patient’s personal information, (iii) tax-related health provisions governing medical savings accounts, (iv) application and enforcement of group health insurance requirements, (v) revenue offset governing tax deductions for employers. Title II of HIPAA deals with Fraud/Abuse in healthcare, Administrative Simplification via standardization of electronic exchange and privacy and security of protected health information (PHI). PHI is individually identifiable information of patient’s health record that covered entities and their business associates maintain or share. As defined by HIPAA a covered entity is a health plan, a healthcare clearinghouse, or a healthcare provider. Business associates are individuals or organizations that perform work on the behalf of the covered entities. The title II provision of ‘Administrative Simplification’ include rules for protecting privacy and security of PHI. The US Department of Health and Human Services Office for…

    • 1261 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    HIPAA affects the billing process by making sure that patient demographics are accurate and kept confidential. There should be in the patient’s file an authorization to allow a practice to use the confidential information and to bill that patient information to carrier for services. Without this authorization on file the practice may not release or disclose any patient information regarding any treatment that this patient has had and therefore will not be able to seek reimbursement from the payer (Valerius, Bayes, Newby, & Seggern, 2008). A patients’ medical records, the progress notes, reports and other clinical materials are legal documents that belong to the provider who created them. But the provider cannot withhold the information in the records unless providing it would be detrimental to the patients’ health. This information belongs to the patient. Medical insurance specialist handles issues such as requests for information from patient records. They are trained to know what information can be released about patients’ conditions and treatments. What information can be legally shared with other providers and health plans and what information must the patient specifically authorize to be released (Valerius, Bayes, Newby, & Seggern, 2008). Because the claims are sent electronically, encryption is required for security, the process of encoding information in such a way that only the…

    • 1589 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Regulatory Paper

    • 546 Words
    • 3 Pages

    According to Austin, (2012) the Health Insurance Portability and Accountability Act of 1996 is "a federal law that mandates insurance portability and sets up procedures for electronic data exchange," (Page 20). This legislation is a congressional attempt to ensure patient 's privacy is protected. The HIPAA consists of five sections or titles. The first title "provides for insurance portability," (Austin, 2012 Page 25). The second title regulates abusive and fraudulent acts of medical obligations. It also standardizes administrative transactions. This title covers additional security precautions and demands electronic data interchange (EDI). The third title pertains to taxes. The fourth and final title incorporate specific healthcare plans and proceeds counterbalance. The Health Insurance Portability And Accountability is a mandate established by the federal legislation. Patient 's health information is exchanged amongst different sectors of the healthcare industry. Therefore, the federal government must safeguard patient 's privacy.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The federal Health Insurance Portability and Accountability Act (HIPPA) is a security measure to preserve the confidentiality of medical records and standardized electronic data interchange (EDI) among providers, insurers, and government agencies.…

    • 380 Words
    • 2 Pages
    Good Essays