CIS 534 Advanced Network Security Design.: Ethical Hacker

This assignment explores ethical hacking and advanced network security design in CIS 534.

Michael Davis
Contributor
4.8
54
5 months ago
Preview (3 of 7 Pages)
100%
Purchase to unlock

Page 1

CIS 534 Advanced Network Security Design.: Ethical Hacker - Page 1 preview image

Loading page image...

Running Head: ETHICAL HACKER.1Student's Name: Arinze MomifeProfessor: Dr. D.Course: CIS 534 Advanced Network Security Design.Title: Ethical Hacker.(Term Paper).Date: 05/26/2015.In the context of ethical hacking and penetration testing, discuss the different methodologies andtools used to assess the security of an organization. Specifically, explain the roles of socialengineering, SQL injection, malware (Rootkit), eavesdropping, and replay attacks in this process.How would you implement each of these methods while maintaining ethical standards?Furthermore, elaborate on the precautions you would take to ensure anonymity and avoiddetection during penetration testing. Support your response with relevant sources and examples,and ensure your answer meets a word count requirement of 800-1,000 words.Word Count Requirement: 800-1,000 words.

Page 2

CIS 534 Advanced Network Security Design.: Ethical Hacker - Page 2 preview image

Loading page image...

Page 3

CIS 534 Advanced Network Security Design.: Ethical Hacker - Page 3 preview image

Loading page image...

ETHICAL HACKER.2Recollecting this occupation or the methodology will be finished ethically, I will use thestrategy for penetration testing. Penetration testing, is a dynamic and authorize attempt toanalyze to the security of an Information Technology (IT) infrastructure, in an offer to safelyabuse the structure vulnerabilities, application's blemish, deficiencies of the shrouded plans andeven the end customer risky behaviors. These assessments can also be very effective inauthenticating the defensive mechanisms of users, while in turn adhering with all necessarysecurity policies.Penetration testing is carried out using technologies that are either manual or automated,in other to gain access to server, databases, endpoints, web proxies, firewalls, web gateways,wireless network devices. The moment vulnerabilities are discovered, this includes, allconfigured gateways, all configured web applications, then these flows on the network will becapitalized upon. (core security, 2015).This penetration testing can be carried out using different means which shall be discussed in thisarticle. The penetration steps include the following:Social Engineering.SQL injection.Malware (Rootkit).Eavesdropping .Replay Attacks.
Preview Mode

This document has 7 pages. Sign in to access the full document!

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all