CIS 534 Advanced Network Security Design.: Ethical Hacker

This assignment explores ethical hacking and advanced network security design in CIS 534.

Michael Davis
Contributor
4.9
46
about 1 month ago
Preview (3 of 7)
Sign in to access the full document!
Running Head: ETHICAL HACKER. 1
Student's Name: Arinze Momife
Professor: Dr. D.
Course: CIS 534 Advanced Network Security Design.
Title: Ethical Hacker. (Term Paper).
Date: 05/26/2015.
In the context of ethical hacking and penetration testing, discuss the different methodologies and
tools used to assess the security of an organization. Specifically, explain the roles of social
engineering, SQL injection, malware (Rootkit), eavesdropping, and replay attacks in this process.
How would you implement each of these methods while maintaining ethical standards?
Furthermore, elaborate on the precautions you would take to ensure anonymity and avoid
detection during penetration testing. Support your response with relevant sources and examples,
and ensure your answer meets a word count requirement of 800-1,000 words.
Word Count Requirement: 800-1,000 words.
ETHICAL HACKER. 2
Recollecting this occupation or the methodology will be finished ethically, I will use the
strategy for penetration testing. Penetration testing, is a dynamic and authorize attempt to
analyze to the security of an Information Technology (IT) infrastructure, in an offer to safely
abuse the structure vulnerabilities, application's blemish, deficiencies of the shrouded plans and
even the end customer risky behaviors. These assessments can also be very effective in
authenticating the defensive mechanisms of users, while in turn adhering with all necessary
security policies.
Penetration testing is carried out using technologies that are either manual or automated,
in other to gain access to server, databases, endpoints, web proxies, firewalls, web gateways,
wireless network devices. The moment vulnerabilities are discovered, this includes, all
configured gateways, all configured web applications, then these flows on the network will be
capitalized upon. (core security, 2015).
This penetration testing can be carried out using different means which shall be discussed in this
article
. The penetration steps include the following:
Social Engineering.
SQL injection.
Malware (Rootkit).
Eavesdropping .
Replay Attacks.
Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

University
Strayer University
Subject
Information Technology

Related Documents

View all