This book is about hacking ethically the methodology of testing your
|
|
|
- Shanna Jackson
- 10 years ago
- Views:
Transcription
1 Chapter 1 Introduction to Ethical Hacking In This Chapter Understanding hackers and malicious users objectives Differentiating between ethical hackers and malicious attackers Examining how the ethical hacking process came about Understanding the dangers that your computer systems face Starting to use the ethical hacking process This book is about hacking ethically the methodology of testing your computers and networks for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them. Although ethical is an often overused and misunderstood word, Webster s New World Dictionary defines ethical perfectly for the context of this book and the professional security testing techniques that I cover that is, conforming to the standards of conduct of a given profession or group. IT and information security practitioners are obligated to perform the tests covered in this book aboveboard and only after permission has been obtained by the owner(s) of the systems hence the disclaimer in this book s Introduction. Straightening Out the Terminology COPYRIGHTED MATERIAL Most people have heard of hackers and malicious users. Many have even suffered the consequences of hackers criminal actions. So who are these people? And why do you need to know about them? The next few sections give you the lowdown on these attackers. In this book, I use the following terminology:
2 10 Part I: Building the Foundation for Ethical Hacking Hackers (or external attackers) try to compromise computers and sensitive information for ill-gotten gains usually from the outside as an unauthorized user. Hackers go for almost any system they think they can compromise. Some prefer prestigious, well-protected systems, but hacking into anyone s system increases an attacker s status in hacker circles. Malicious internal users (or internal attackers) try to compromise computers and sensitive information from the inside as authorized and trusted users. Malicious users go for systems they believe they can compromise for ill-gotten gains or revenge. Malicious attackers are, generally speaking, both hackers and malicious users. For the sake of simplicity, I refer to both as hackers and specify hacker or malicious user only when I need to drill down further into their tools, techniques, and ways of thinking. Ethical hackers (or good guys) hack systems to discover vulnerabilities to protect against unauthorized access, abuse, and misuse. Defining hacker Hacker has two meanings: Traditionally, hackers like to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work both mechanically and electronically. In recent years, hacker has taken on a new meaning someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers). Crackers break into, or crack, systems with malicious intent. They are out for personal gain: fame, profit, and even revenge. They modify, delete, and steal critical information, often making other people miserable. The good-guy (white hat) hackers don t like being in the same category as the bad-guy (black hat) hackers. (In case you re curious, the white hat and black hat terms come from old Western TV shows in which the good guys wore white cowboy hats and the bad guys wore black cowboy hats.) Gray hat hackers are a little bit of both. Whatever the case, most people have a negative connotation for the word hacker. Many malicious hackers claim that they don t cause damage but instead help others. Yeah, right. Malicious hackers are electronic thieves and deserve the consequences of their actions.
3 Chapter 1: Introduction to Ethical Hacking 11 Defining malicious user Malicious users meaning a rogue employee, contractor, intern, or other user who abuses his or her privileges is a common term in security circles and in headlines about information breaches. A long-standing statistic states that insiders carry out 80% of all security breaches. Whether this number is accurate is still questionable, but based on what I ve seen and numerous annual surveys, undoubtedly an insider problem makes up the majority of all computer breaches. The issue is not necessarily users hacking internal systems, but rather users who abuse the computer access privileges they ve been given. Users ferret through critical database systems to glean sensitive information, confidential client information to the competition or other third parties, or delete sensitive files from servers that they probably didn t need to have access to in the first place. There s also the occasional ignorant insider whose intent is not malicious but who still causes security problems by moving, deleting, or corrupting sensitive information. Malicious users are often ethical hackers worst enemies because they know exactly where to go to get the goods and don t need to be computer savvy to compromise sensitive information. These users have the access they need and the management trusts them without question. Recognizing How Malicious Attackers Beget Ethical Hackers You need protection from hacker shenanigans; you need (or need to become) an ethical hacker. An ethical hacker possesses the skills, mindset, and tools of a hacker but is also trustworthy. Ethical hackers perform the hacks as security tests for their systems based on how hackers might work. Ethical hacking which encompasses formal and methodical penetration testing, white hat hacking, and vulnerability testing involves the same tools, tricks, and techniques that hackers use, but with one major difference: Ethical hacking is performed with the target s permission. The intent of ethical hacking is to discover vulnerabilities from a malicious attacker s viewpoint to better secure systems. Ethical hacking is part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors claims about the security of their products are legitimate.
4 12 Part I: Building the Foundation for Ethical Hacking If you perform ethical hacking tests for clients or simply want to add another certification to your credentials, you might want to consider becoming a Certified Ethical Hacker (C EH), through a certification program sponsored by EC-Council. See for more information. Ethical hacking versus auditing Many people confuse ethical hacking with security auditing but there are big differences. Security auditing involves comparing a company s security policies to what s actually taking place. The intent of security auditing is to validate that security controls exist typically using a risk-based approach. Auditing often involves reviewing business processes and might not be very technical. I often refer to security audits as security checklists because they re usually based off (you guessed it) checklists. Conversely, ethical hacking focuses on vulnerabilities that can be exploited. It validates that security controls do not exist. Ethical hacking can be both highly technical and nontechnical and, although you do use a formal methodology, it tends to be a bit less structured than formal auditing. If auditing continues to take place in your organization, you might consider integrating the ethical hacking techniques I outline into your auditing process. Policy considerations If you choose to make ethical hacking an important part of your business s risk management program, you really need to have a documented security testing policy. Such a policy outlines the type of ethical hacking that is done, which systems (such as servers, Web applications, laptops, and so on) are tested, and how often the testing is performed. Specific procedures for carrying out your security tests could outline the ethical hacking methodology I cover in this book. You might also consider creating a security standards document that outlines the specific security testing tools that are used and specific dates your systems are tested each year. You might list standard testing dates, such as once per quarter for external systems and biannual tests for internal systems. Compliance and regulatory concerns Your own internal policies might dictate how company management views security testing, but you also need to consider the state, federal, and global laws and regulations that affect your business. Many of the federal laws and regulations, such as the Health Insurance Portability and Accountability Act
5 Chapter 1: Introduction to Ethical Hacking 13 (HIPAA), Gramm-Leach-Bliley Act (GLBA), North American Electric Reliability Corporation (NERC) CIP requirements, and Payment Card Industry Data Security Standard (PCI DSS) require periodic and consistent security evaluations. Incorporating your ethical hacking into these required tests is a great way to meet the state and federal regulations and beef up your overall privacy and security compliance program. Understanding the Need to Hack Your Own Systems To catch a thief, you must think like a thief. That s the basis for ethical hacking. Knowing your enemy is absolutely critical. See Chapter 2 for details about how malicious attackers work. The law of averages works against security. With the increased number of hackers and their expanding knowledge, and the growing number of system vulnerabilities and other unknowns, eventually, all computer systems and applications will be hacked or compromised in some way. Protecting your systems from the bad guys and not just the generic vulnerabilities that everyone knows about is absolutely critical. When you know hacker tricks, you find out how vulnerable your systems really are. Hacking preys on weak security practices and undisclosed vulnerabilities. Firewalls, encryption, and passwords can create a false feeling of safety. These security systems often focus on high-level vulnerabilities, such as basic access control, without affecting how the bad guys work. Attacking your own systems to discover vulnerabilities helps make them more secure. Ethical hacking is the only proven method of greatly hardening your systems from attack. If you don t identify weaknesses, it s only a matter of time before the vulnerabilities are exploited. As hackers expand their knowledge, so should you. You must think like them and work like them to protect your systems from them. As the ethical hacker, you must know the activities that hackers carry out and how to stop their efforts. Knowing what to look for and how to use that information helps you to thwart hackers efforts. You don t have to protect your systems from everything. You can t. The only protection against everything is to unplug your computer systems and lock them away so no one can touch them not even you. But doing so is not the best approach to information security and it s certainly not good for business. What s important is to protect your systems from known vulnerabilities and common attacks.
6 14 Part I: Building the Foundation for Ethical Hacking Anticipating all the possible vulnerabilities you ll have in your systems and business processes is impossible. You certainly can t plan for all possible attacks especially the unknown ones. However, the more combinations you try and the more you test whole systems instead of individual units, the better your chances are of discovering vulnerabilities that affect your information systems in their entirety. Don t take ethical hacking too far, though; hardening your systems from unlikely attacks makes little sense. For instance, if you don t have a lot of foot traffic in your office and no internal Web server running, you might not have as much to worry about as an Internet hosting provider might have. Your overall goals as an ethical hacker are Prioritize your systems so you can focus your efforts on what matters. Hack your systems in a nondestructive fashion. Enumerate vulnerabilities and, if necessary, prove to management that vulnerabilities exist and can be exploited. Apply results to remove the vulnerabilities and better secure your systems. Understanding the Dangers Your Systems Face It s one thing to know generally that your systems are under fire from hackers around the world and malicious users around the office; it s another to understand the specific attacks against your systems that are possible. This section offers some well-known attacks but is by no means a comprehensive listing. Many information security vulnerabilities aren t critical by themselves. However, exploiting several vulnerabilities at the same time can take its toll on a system. For example, a default Windows OS configuration, a weak SQL Server administrator password, or a server hosted on a wireless network might not be major security concerns separately but a hacker exploiting all three of these vulnerabilities at the same time could lead to sensitive information disclosure and more. Nontechnical attacks Exploits that involve manipulating people end users and even yourself are the greatest vulnerability within any computer or network infrastructure. Humans are trusting by nature, which can lead to social engineering exploits.
7 Chapter 1: Introduction to Ethical Hacking 15 Social engineering is the exploitation of the trusting nature of human beings to gain information for malicious purposes. Check out Chapter 5 for more information about social engineering and how to guard your systems against it. Other common and effective attacks against information systems are physical. Hackers break into buildings, computer rooms, or other areas containing critical information or property to steal computers, servers, and other valuable equipment. Physical attacks can also include dumpster diving rummaging through trash cans and dumpsters for intellectual property, passwords, network diagrams, and other information. Network infrastructure attacks Hacker attacks against network infrastructures can be easy because many networks can be reached from anywhere in the world via the Internet. Some examples of network infrastructure attacks include the following: Connecting to a network through an unsecured wireless router attached behind a firewall Exploiting weaknesses in network protocols, such as TCP/IP and NetBIOS Flooding a network with too many requests, creating a denial of service (DoS) for legitimate requests Installing a network analyzer on a network and capturing every packet that travels across it, revealing confidential information in clear text Operating system attacks Hacking an operating system (OS) is a preferred method of the bad guys. OS attacks make up a large portion of hacker attacks simply because every computer has an operating system and OSes are susceptible to many well-known exploits. Occasionally, some operating systems that tend to be more secure out of the box such as Novell NetWare and OpenBSD are attacked, and vulnerabilities turn up. But hackers often prefer attacking Windows and Linux because they are widely used and better known for their weaknesses. Here are some examples of attacks on operating systems: Exploiting specific network protocol implementations Attacking built-in authentication systems Breaking file system security Cracking passwords and weak encryption implementations
8 16 Part I: Building the Foundation for Ethical Hacking Application and other specialized attacks Applications take a lot of hits by hackers. Programs, such as server software and Web applications, are often beaten down: Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP) applications are frequently attacked because most firewalls and other security mechanisms are configured to allow full access to these services from the Internet. Voice over Internet Protocol (VoIP) faces increasing attacks as it finds its way into more and more businesses. Unsecured files containing sensitive information are scattered throughout workstation and server shares, and database systems contain numerous vulnerabilities that malicious users can exploit. Ethical hackers carry out such attacks against computer systems, physical controls, and people and highlight any associated weaknesses. Parts II through V of this book cover these attacks in detail, along with specific countermeasures you can implement against attacks against your business. Obeying the Ethical Hacking Commandments Every ethical hacker must abide by a few basic commandments. If not, bad things can happen. I ve seen these commandments ignored or forgotten when planning or executing ethical hacking tests. The results weren t positive trust me. Working ethically The word ethical in this context means working with high professional morals and principles. Whether you re performing ethical hacking tests against your own systems or for someone who has hired you, everything you do as an ethical hacker must be aboveboard and must support the company s goals. No hidden agendas allowed! Trustworthiness is the ultimate tenet. The misuse of information is absolutely forbidden. That s what the bad guys do. Let them receive a fine or go to prison because of their poor choices.
9 Chapter 1: Introduction to Ethical Hacking 17 Respecting privacy Treat the information you gather with the utmost respect. All information you obtain during your testing from Web application log files to clear text passwords to personally identifiable information and beyond must be kept private. Don t snoop into confidential corporate information or employees private lives. If you sense that a colleague or team member breaches privacy and you feel like someone should know about it, consider sharing that information with the appropriate manager or project sponsor. Involve others in your process. Employ a watch-the-watcher system that can help build trust and support for your ethical hacking projects. Not crashing your systems One of the biggest mistakes I ve seen people make when trying to hack their own systems is inadvertently crashing the systems they re trying to keep running. Poor planning is the main cause of this mistake. These testers either have not read the documentation or misunderstand the usage and power of the security tools and techniques at their disposal. Although it s not likely, you can create DoS conditions on your systems when testing. Running too many tests too quickly can cause system lockups, data corruption, reboots, and more. I should know: I ve done it! Don t rush and assume that a network or specific host can handle the beating that network tools and vulnerability scanners can dish out. Many vulnerability scanners can control how many tests are performed on a system at the same time. These tools are especially handy when you need to run the tests on production systems during regular business hours. You can even accidentally create an account or system lockout condition by socially engineering someone into changing a password, not realizing the consequences of your actions. Using the Ethical Hacking Process Like practically any IT or security project, ethical hacking needs to be planned. It s been said that action without planning is at the root of every failure. Strategic and tactical issues in the ethical hacking process need to be determined and agreed upon. To ensure the success of your efforts, spend time up front planning for any amount of testing from a simple passwordcracking test to an all-out penetration test on a Web application.
10 18 Part I: Building the Foundation for Ethical Hacking If you choose to hire a reformed hacker to work with you during your testing or to obtain an independent perspective, be careful. I cover the pros, cons, do s, and don ts associated with hiring an ethical hacker in Chapter 18. Formulating your plan Getting approval for ethical hacking is essential. Make sure that what you re doing is known and visible at least to the decision makers. Obtaining sponsorship of the project is the first step. Sponsorship could come from your manager, an executive, your client, or even yourself if you re the boss. You need someone to back you up and sign off on your plan. Otherwise, your testing might be called off unexpectedly if someone claims you were never authorized to perform the tests. The authorization can be as simple as an internal memo or an from your boss when you perform these tests on your own systems. If you re testing for a client, have a signed contract stating the client s support and authorization. Get written approval on this sponsorship as soon as possible to ensure that none of your time or effort is wasted. This documentation is your Get Out of Jail Free card if anyone questions what you re doing, or worse, if the authorities come calling. Don t laugh it wouldn t be the first time it happened. One slip can crash your systems not necessarily what anyone wants. You need a detailed plan, but that doesn t mean you need volumes of testing procedures to make things overly complex. A well-defined scope includes the following information: Specific systems to be tested: When selecting systems to test, start with the most critical systems and processes or the ones you suspect are the most vulnerable. For instance, you can test server OS passwords, an Internet-facing Web application, or attempt social engineering attacks before drilling down into all your systems. Risks involved: Have a contingency plan for your ethical hacking process in case something goes awry. What if you re assessing your firewall or Web application and you take it down? This can cause system unavailability, which can reduce system performance or employee productivity. Even worse, it might cause loss of data integrity, loss of data itself, and even bad publicity. It ll most certainly tick off a person or two and make you look bad.
11 Chapter 1: Introduction to Ethical Hacking 19 Handle social engineering and DoS attacks carefully. Determine how they affect the systems you test and your entire organization. Dates the tests will be performed and your overall timeline: Determining when the tests are performed is something that you must think long and hard about. Do you perform tests during normal business hours? How about late at night or early in the morning so that production systems aren t affected? Involve others to make sure they approve of your timing. The best approach is an unlimited attack, where any type of test is possible at any time of day. The bad guys aren t breaking into your systems within a limited scope, so why should you? Some exceptions to this approach are performing DoS attacks, social engineering, and physical security tests. Knowledge of the systems you have before you start testing: You don t need extensive knowledge of the systems you re testing just a basic understanding. This basic understanding helps protect you and the tested systems. Understanding the systems you re testing shouldn t be difficult if you re hacking your own in-house systems. If you re testing a client s systems, you may have to dig deeper. In fact, I ve only had one or two clients ask for a fully blind assessment. Most IT managers and others responsible for security are scared of these assessments and they can take more time and cost more. Base the type of test you perform on your organization or client s needs. Actions you will take when a major vulnerability is discovered: Don t stop after you find one security hole. Keep going to see what else you can discover. I m not saying to keep hacking until the end of time or until you crash all your systems; simply pursue the path you re going down until you can t hack it any longer (pun intended). If you haven t found any vulnerability, you haven t looked hard enough. If you uncover something big, you do need to share that information with the key players as soon as possible to plug the hole before it s exploited. The specific deliverables: This includes vulnerability scanner reports and a higher-level report outlining the important vulnerabilities to address, along with countermeasures to implement. One of your goals might be to perform the tests without being detected. For example, you might perform your tests on remote systems or on a remote office, and you don t want the users aware of what you re doing. Otherwise, the users might catch on to you and be on their best behavior instead of their normal behavior.
12 20 Part I: Building the Foundation for Ethical Hacking Selecting tools As with any project, if you don t have the right tools for ethical hacking, you might have difficulty accomplishing the task effectively. Having said that, just because you use the right tools doesn t mean that you ll discover all the right vulnerabilities. Know the personal and technical limitations. Many vulnerability scanners generate false positives and negatives (incorrectly identifying vulnerabilities). Others just skip right over vulnerabilities altogether. In certain situations, you might need to run multiple vulnerability scanners to find the most vulnerabilities. Many tools focus on specific tests, and no tool can test for everything. For the same reason you wouldn t drive a nail with a screwdriver, don t use a word processor to scan your network for open ports. This is why you need a set of specific tools for the task. The more (and better) tools you have, the easier your ethical hacking efforts are. Make sure you re using the right tool for the task: To crack passwords, you need cracking tools, such as ophcrack and Proactive Password Auditor. A general port scanner, such as SuperScan or Nmap, won t work for cracking passwords and rooting out detailed vulnerabilities. For an in-depth analysis of a Web application, a Web application assessment tool (such as N-Stalker or WebInspect) is more appropriate than a network analyzer (such as Wireshark). When selecting the right security tool for the task, ask around. Get advice from your colleagues and from other people online. A simple groups search on Google ( LinkedIn ( or a perusal of security portals, such as and often produces great feedback from other security experts about what works and what doesn t. Hundreds, if not thousands, of tools can be used for ethical hacking from software-based vulnerability scanner programs to hardware-based network analyzers. The following list runs down some of my favorite commercial, freeware, and open source security tools: Cain & Abel OmniPeek
13 Chapter 1: Introduction to Ethical Hacking 21 SuperScan QualysGuard WebInspect Proactive Password Auditor Metasploit LANguard AirMagnet WiFi Analyzer I discuss these tools and many others in Parts II through V when I go into the specific hack attacks. Appendix A contains a more comprehensive listing of these tools for your reference. The capabilities of many security and hacking tools are often misunderstood. This misunderstanding has cast a negative light on otherwise excellent and legitimate tools. Some of these security testing tools are complex. Whichever tools you use, familiarize yourself with them before you start using them. Here are ways to do that: Read the readme and/or online help files and FAQs. Study the user s guides. Use the tools in a lab or test environment. Consider formal classroom training from the security tool vendor or another third-party training provider, if available. Look for these characteristics in tools for ethical hacking: Adequate documentation Detailed reports on the discovered vulnerabilities, including how they might be exploited and fixed General industry acceptance Availability of updates and support High-level reports that can be presented to managers or nontechnical types These features can save you a ton of time and effort when you re performing your tests and writing your final reports.
14 22 Part I: Building the Foundation for Ethical Hacking Executing the plan Good ethical hacking takes persistence. Time and patience are important. Be careful when you re performing your ethical hacking tests. A hacker in your network or a seemingly benign employee looking over your shoulder might watch what s going on and use this information against you or your business. Making sure that no hackers are on your systems before you start isn t practical. Be sure you keep everything as quiet and private as possible. This is especially critical when transmitting and storing your test results. If possible, encrypt any s and files containing sensitive test information by using Pretty Good Privacy (PGP) ( encrypted Zip file, or similar technology. You re now on a reconnaissance mission. Harness as much information as possible about your organization and systems, much like malicious hackers do. Start with a broad view and narrow your focus: 1. Search the Internet for your organization s name, your computer and network system names, and your IP addresses. Google is a great place to start. 2. Narrow your scope, targeting the specific systems you re testing. Whether you re assessing physical security structures or Web applications, a casual assessment can turn up a lot of information about your systems. 3. Further narrow your focus with a more critical eye. Perform actual scans and other detailed tests to uncover vulnerabilities on your systems. 4. Perform the attacks and exploit any vulnerabilities you find, if that s what you choose to do. Check out Chapter 4 to find out more information and tips on using this process. Evaluating results Assess your results to see what you ve uncovered, assuming that the vulnerabilities haven t been made obvious before now. This is where knowledge counts. Your skill at evaluating the results and correlating the specific vulnerabilities discovered will get better with practice. You ll end up knowing your systems much better than anyone else. This makes the evaluation process much simpler moving forward.
15 Chapter 1: Introduction to Ethical Hacking 23 Submit a formal report to upper management or to your client, outlining your results and any recommendations you wish to share. Keep these parties in the loop to show that your efforts and their money are well spent. Chapter 16 describes the ethical hacking reporting process. Moving on When you finish your ethical hacking tests, you (or your client) still need to implement your recommendations to make sure the systems are secure. Otherwise, all the time, money, and effort spent on ethical hacking goes to waste. New security vulnerabilities continually appear. Information systems constantly change and become more complex. New hacker exploits and security vulnerabilities are regularly uncovered. You might even discover new ones yourself! Vulnerability scanners get better and better. Security tests are a snapshot of the security posture of your systems. At any time, everything can change, especially after upgrading software, adding computer systems, or applying patches. Plan to test regularly and consistently (for example, once a month, once a quarter, or biannually). Chapter 18 covers managing security changes.
16 24 Part I: Building the Foundation for Ethical Hacking
This book is about hacking ethically the science of testing your computers
Chapter 1 Introduction to Ethical Hacking In This Chapter Understanding hacker objectives Outlining the differences between ethical hackers and malicious hackers Examining how the ethical hacking process
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
YOUR HIPAA RISK ANALYSIS IN FIVE STEPS
Ebook YOUR HIPAA RISK ANALYSIS IN FIVE STEPS A HOW-TO GUIDE FOR YOUR HIPAA RISK ANALYSIS AND MANAGEMENT PLAN 2015 SecurityMetrics YOUR HIPAA RISK ANALYSIS IN FIVE STEPS 1 YOUR HIPAA RISK ANALYSIS IN FIVE
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
Need for Database Security. Whitepaper
Whitepaper 2 Introduction The common factor in today s global economy where most of the business is done electronically via B2B [Business to Business] or via B2C [business to consumer] or other more traditional
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
SecurityMetrics Vision whitepaper
SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Penetration testing & Ethical Hacking. Security Week 2014
Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information
Penetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
ETHICAL HACKING: A TECHNIQUE TO ENHANCE INFORMATION SECURITY
ETHICAL HACKING: A TECHNIQUE TO ENHANCE INFORMATION SECURITY Gurpreet K. Juneja 1 Lecturer, Department of Computer Science & Engineering, Guru Nanak Dev Engineering College, Ludhiana, India 1 Abstract:
About Effective Penetration Testing Methodology
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:
PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration
Secure Remote Control Security Features for Enterprise Remote Access and Control
Secure Remote Control Security Features for Enterprise Remote Access and Control Good communication is vital to any company, large or small. Many departments within companies are utilizing different platforms
Vinny Hoxha Vinny Hoxha 12/08/2009
Ethical Hacking and Penetration Testing Vinny Hoxha Vinny Hoxha 12/08/2009 What is Ethical Hacking? Types of Attacks Testing Approach Vulnerability Assessments vs. Penetration Testing Testing Methodology
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
INTRODUCTION TO PENETRATION TESTING
82-02-67 DATA SECURITY MANAGEMENT INTRODUCTION TO PENETRATION TESTING Stephen Fried INSIDE What is Penetration Testing? Terminology; Why Test? Types of Penetration Testing; What Allows Penetration Testing
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
How To Choose the Right Vendor Information you need to select the IT Security Testing vendor that is right for you.
Information you need to select the IT Security Testing vendor that is right for you. Netragard, Inc Main: 617-934- 0269 Email: [email protected] Website: http://www.netragard.com Blog: http://pentest.netragard.com
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments
DATA SHEET Technical Testing Application, Network and Red Team Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
PCI Security Scan Procedures. Version 1.0 December 2004
PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING Chenchu Lakshmi S 1, P I Basarkod 2 1 M-Tech (DCN) Student, Reva institute of Technology and Management, Bangalore, India 2 Sr. Associate Prof. (ECE), Reva Institute of Technology
NETWORK SECURITY. 3 Key Elements
NETWORK SECURITY 3 Key Elements OVERVIEW Network is fast becoming critical and required infrastructure in organizations or even in our live nowadays. Human networking is important in many aspects especially
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security
Secrets of Vulnerability Scanning: Nessus, Nmap and More Ron Bowes - Researcher, Tenable Network Security 1 About me Ron Bowes (@iagox86) My affiliations (note: I m here to educate, not sell) 2 SkullSpace
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Put into test the security of an environment and qualify its resistance to a certain level of attack.
Penetration Testing: Comprehensively Assessing Risk What is a penetration test? Penetration testing is a time-constrained and authorized attempt to breach the architecture of a system using attacker techniques.
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
SPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010
Penetration Testing Getting the Most out of Your Assessment Chris Wilkinson Crowe Horwath LLP September 22, 2010 Introduction Chris Wilkinson, CISSP Crowe Horwath LLP Product Manager - Penetration Testing
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Secure Web Applications. The front line defense
Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
How To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
