Preview

Hacking Research Paper

Better Essays
Open Document
Open Document
1378 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking Research Paper
Hacking

Throughout my path to obtaining a degree in Cybersecurity I have learned quit a bit. It has enabled me to acquire the CompTIA Network + certification, as well as the CompTIA Security +. In taking this course, I just knew I would learn some new and fascinating things about how to defend my network. What better way to do so, than to think like a criminal? Though I have learned some interesting techniques, such as the use of sniffers like Wireshark or NIDS software like Tripwire, it seems that the basic fundamentals are always the same. Through the plethora of tools available for hacking a system and preventing attack, you are mostly safeguarding three main vectors of information security. The enemy is solely concerned with attacking the confidentiality, availability and integrity (CIA) of your information and information systems. So, I felt it was best to stick to the basics. There is no way to prevent all of the ways of hacking a system, but you must understand the attackers aim. As I have gone through this class, I have asked myself the same question continuously, what are they after? When you can begin to understand whether they are there to steal information, modify or delete, or merely disrupt the information process, you can begin to defend your network against these attacks. The array of software and hardware tools out there to hack a system or protect the network will change with the sophistication of systems in the future, but the fundamentals will remain. Reconnaissance; know what vector your enemy may be interested in, confidentiality, integrity or availability are their targets. Are you protected?
Confidentiality, integrity, and availability of your systems are of extreme importance. Confidentiality of the data within your network is the thriving force of business. This data is pertinent to the company and consumer. The information could possibly entail financial records or even identifying information. All of which, if found in the wrong



References: Walker, M. (2012). CEH Certified Ethical Hacker. United States of America: McGraw-Hill Companies. Whitman, M.E., & Mattord, H.J. (2009). Principles of information security (pp.60-81). Boston, Ma: Thomson Course Technology

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    It 244 Week 1 Checkpoint

    • 721 Words
    • 3 Pages

    Mark S Merkow, Jim Breithaupt. (2006). Information Security. Principles and Practices- Chapter 4. Retrieved from Mark S Merkow, Jim Briethaupt, IT244-Intro to IT Security.…

    • 721 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Security is a business issue because companies have very valuable information assets to protect. Business must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so may open the firm to costly litigation for data exposure or theft. Systems often hold confidential information about customers information( social security, date of birth, credit card information, taxes), corporate operations, new product development plans, marketing strategies. These information assets have tremendous value for the companies and can be devastating if they are lost, destroyed, disturbed or placed in wrong hands.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Discussion question

    • 1527 Words
    • 7 Pages

    Screen shot of the detailed view of the 2nd infection "";"C:\Helix\IR\nirsoft\LSASecretsView.exe";"May be infected by unknown virus Win32/DH{HhMXFE8VGw}";"Moved to Virus Vault"…

    • 1527 Words
    • 7 Pages
    Good Essays