Preview

Ceh Cheat Sheet

Powerful Essays
Open Document
Open Document
3910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ceh Cheat Sheet
Footprinting

The phases of an attack

1. Reconnaissance Information gathering, physical and social engineering, locate network range 2. Scanning - Enumerating Live hosts, access points, accounts and policies, vulnerability assessment 3. Gaining Access Breech systems, plant malicious code, backdoors 4. Maintaining Access Rootkits, unpatched systems 5. Clearing Tracks IDS evasion, log manipulation, decoy traffic

Information Gathering

1. Unearth initial information What/ Who is the target? 2. Locate the network range What is the attack surface? 3. Ascertain active machines What hosts are alive? 4. Open ports / access points How can they be accessed? 5. Detect operating systems What platform are they? 6. Uncover services on ports What software can be attacked? 7. Map the network Tie it all together, document, and form a strategy.

Know the OSI model

Application | 7 | Service protocols | Presentation | 6 | Data formats | Session | 5 | Authentication, Cryptographic agreements | Transport | 4 | Ports, logical service to service connections | Network | 3 | Network to network delivery | Data Link | 2 | Host to host links, contention | Physical | 1 | Media |
LEGAL
United States

Computer fraud and abuse act Addresses hacking activities
18 U.S.C. 1029 Possession of Access Devices
18 U.S.C. 1030 Fraud and Related Activity in Conncetion with Computers

CAN-SPAM Defines legal eMail marketing SPY-Act Protects vendors monitoring for licence enforcement DMCA - Digital Milenium Copyright Act Protects intellectual property SOX - Sarbanes Oxley Controls for corporate financial processes GLBA - Gramm-Leech Bliley Act Controls use of personal financial data HIPPA - Health Imformation Portability and Protection Act Privacy for medical records FERPA - Family Educational Rights and Privacy Act Protection for education records FISMA - Federal Information Security Management Act Government networks must have security

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hcs 483 Wk1Dq1 2

    • 457 Words
    • 2 Pages

    Prior to the enactment of the Health Insurance Portability and Accountability Act (HIPPA) health information was able to be shared without the knowledge or permission of the patient. This information was available to just about anyone including insurance agencies, places of employment and even loan lenders. People would potentially use individuals’ health information to deny them work or a loan for their home and even impacting higher insurance rates or denial of coverage. According to U.S. Department of Health and Human Services (n.d.), “The Privacy Rule establishes a Federal floor of safeguards to protect the confidentiality of medical information. State laws which provide stronger privacy protections will continue to apply over and above the new Federal privacy standards.” (para. 1). Also, as medical records continue to move entirely to the new standard of electronic records it is important to have one standard across the country to protect everyone’s information. Electronic health records (EHR) make it easier than ever to accidentally share medical information, to include having it stolen. Medical providers are just as likely to face consequence if their facility is broken in to and the hard drive with patients information is stolen as they would be if they gave the information away themselves. In general HIPPA protects patients’ information as well as their right to be treated equally.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The three broad objectives HIPAA privacy standards were designed to accomplish are; define and limit the circumstances in which individuals use and disclose patient health information, establish individual rights regarding patient health information, and require protected individuals to adopt administrative safeguards to protect the confidentiality and privacy of patient healthcare information (Cleverley, pg.95). The HIPAA Privacy Standards prohibit covered entities from using or disclosing individually identifiable health information that is or has been transmitted or maintained electronically. This requirement isn’t limited to the record in which the information appears but applies to the actual information itself. Any information that has been transmitted by email, fax, telephone, or any other…

    • 995 Words
    • 4 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    APUSH Chp 6 Study Guide

    • 1946 Words
    • 9 Pages

    Federalist then switched to Republican after ratification of Constitution-wanted central gov’t and create no danger of democracy…

    • 1946 Words
    • 9 Pages
    Good Essays
  • Good Essays

    NEHA STUDY GUIDE

    • 2196 Words
    • 8 Pages

    You come to work and find stock left in sink at room temperature, what should you do?…

    • 2196 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    The Health Insurance Portability Accountability Act (HIPAA) administers the HIPPA Privacy and Security Rules for individual’s protection of their health information. Many doctors and health care providers recognize and accept all requirements under the Security and Privacy Rules. EHR permits health care providers and doctor’s to use data efficiently in their care and to develop the superiority and effectiveness for the betterment of the patient.…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    HIPPA Tutorial Summary

    • 1340 Words
    • 5 Pages

    HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA privacy rule was passed by congress in August of 2002. According to Understanding Health Information Privacy (2014), "The HIPAA Privacy Rule provides federal protections for individually identifiable health information held by covered entities and their business associates and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of health information needed for patient care and other important purposes.” The Security Rule specifies a sequence of administrative, technical, and physical safeguards for covered entities and their business associates to use to assure the confidentiality, availability, and integrity of electronic protected health information (Understanding Health Information Privacy, 2014). The HIPAA, Health Insurance Portability and Accountability Act, tutorials are a memento that there is continuous need for progress on the part of health care professionals and individuals. There is a strong need among health care professionals to know the guidelines, rules and regulations to stay within the laws set onward by the federal government.…

    • 1340 Words
    • 5 Pages
    Good Essays
  • Good Essays

    As of today there are issues with the information technology systems, clinical data management systems and the increasing automation of the electronic medical records. All of these present a significant amount of patient privacy and confidentiality issues. When we say confidential, meaning in healthcare we are talking about the protection of a patient’s medical information and keeping their medical information private and safe from any third parties. Administrators are expected to follow the HIPAA Privacy Rule. The HIPAA protects the privacy of patient’s medical information. Patient’s medical records are sensitive personal information that is covered with privacy. There are several ethical…

    • 585 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hippa Regulations

    • 339 Words
    • 2 Pages

    HIPPA (Health Insurance Portability and Accountability Act), was passed in 1996. HIPPA has five purposes: to improve portability and continuity of health insurance coverage in the group and individual markets; to combat waste, fraud, and abuse in health insurance and health care delivery; to promote the use of medical savings accounts; to improve access to long-term care services and coverage; and to simplify the administration of health insurance and for other purposes. HIPPA accomplish these purposes by including a series of “administrative simplification” (AS) provisions that required the DHHS (Department of Health and Human Services) to adopt national standards for electronic health care transactions. The provisions called for an establishment of standards related to EDI (electronic data interchange) of specific administrative and financial transactions, while still protecting the security and privacy of transmitted information. AS, also, includes standards for transactions and code sets, unique identifies, security and electronic signature, and privacy and confidentiality (Healthcare Informatics: An Interdisciplinary Approach (2002)).…

    • 339 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was created to develop regulations to protect the privacy and security of certain health information; which shouldn’t be accessible to individuals without the need to know. The U.S. Department of Health and Human Services (HHS) is responsible for HIPAA compliance within the Privacy Rule as well as the Security Rule. This Privacy Rule develops national standards for protecting certain health information while the Security Rule establishes a national set of security standards for protecting specific health information that is held or transferred in electronic form.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HIPAA Privacy Analysis

    • 170 Words
    • 1 Page

    Patient care has been vulnerable by HIPAA; healthcare providers cannot easily share patient’s information. Each patient or power of attorney must give implied permission for a healthcare provider to share any personal information. Deprived of not being able to share patient information between providers, it takes longer time to get critical information that can affect patient care. Healthcare organizations faces supplementary legal costs if they violate HIPAA privacy provisions. These costs make many organizations careful of sharing a patient information, even if the patient has given permission for information sharing, so that’s why everything has to be documented, initial, and signed.…

    • 170 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    On April 14, 2003 the Health Insurance portability and Accountability Act of 1996 (HIPAA) took effect, and these federal regulation have had an impact on the field of healthcare. It affords certain protections to persons covered by health care plans, including continuity of coverage when changing jobs, standards for electronic health care transactions, and primary safeguards for the privacy of individually identifiable patient information. Protecting healthcare information is the key essential in a healthcare organization. In an Internet video, Barclay (2010) states it is imperative that all healthcare providers be knowledgeable about the HIPAA standards and protect the rights of patients and residents. However, patients also have the responsibilities to give accurate information about their condition and to participate in treatment and care. With that being said the doctrine of informed consent allows patients full disclosure to make a knowledgeable decision about their care. Failure of patient confidentiality gives rise to legal liability. Identifying different forms of security breaches and creating measures to safeguards standards, procedure and policies against leaking personal health information (PHI) will maintain and promote growth of an organization.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Health Insurance Portability and Accountability Act (HIPAA) of 1996 require all professionals and organizations to guard the privacy of their patients and customers. Individuals must provide written consent for any and all releases of medical or health-related information.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Regulatory Paper

    • 546 Words
    • 3 Pages

    According to Austin, (2012) the Health Insurance Portability and Accountability Act of 1996 is "a federal law that mandates insurance portability and sets up procedures for electronic data exchange," (Page 20). This legislation is a congressional attempt to ensure patient 's privacy is protected. The HIPAA consists of five sections or titles. The first title "provides for insurance portability," (Austin, 2012 Page 25). The second title regulates abusive and fraudulent acts of medical obligations. It also standardizes administrative transactions. This title covers additional security precautions and demands electronic data interchange (EDI). The third title pertains to taxes. The fourth and final title incorporate specific healthcare plans and proceeds counterbalance. The Health Insurance Portability And Accountability is a mandate established by the federal legislation. Patient 's health information is exchanged amongst different sectors of the healthcare industry. Therefore, the federal government must safeguard patient 's privacy.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The federal Health Insurance Portability and Accountability Act (HIPPA) is a security measure to preserve the confidentiality of medical records and standardized electronic data interchange (EDI) among providers, insurers, and government agencies.…

    • 380 Words
    • 2 Pages
    Good Essays