SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
Chapter 1
Ethical Hacking Overview Last modified 1-11-17
Hands-On Ethical Hacking and Network Defense 2
Describe the role of an ethical hacker
Describe what you can do legally as an ethical
hacker
Describe what you cannot do as an ethical
hacker
Hands-On Ethical Hacking and Network Defense 4
Ethical hackers
▪ Employed by companies to perform penetration tests
Penetration test
▪ Legal attempt to break into a company’s network to find its
weakest link
▪ Tester only reports findings, does not solve problems
Security test
▪ More than an attempt to break in; also includes analyzing
company’s security policy and procedures
▪ Tester offers solutions to secure or protect the network
Hands-On Ethical Hacking and Network Defense 5
Hackers
▪ Access computer system or network without authorization
▪ Breaks the law; can go to prison
Crackers
▪ Break into systems to steal or destroy data
▪ U.S. Department of Justice calls both hackers
Ethical hacker
▪ Performs most of the same activities but with owner’s permission
Hands-On Ethical Hacking and Network Defense 6
Script kiddies or packet monkeys
▪ Young inexperienced hackers
▪ Copy codes and techniques from knowledgeable hackers
Experienced penetration testers write programs or
scripts using these languages
▪ Practical Extraction and Report Language (Perl), C, C++,
Python, JavaScript,Visual Basic, SQL, and many others
Script
▪ Set of instructions that runs in sequence
This class alone won’t make you a hacker, or an
expert
▪ It might make you a script kiddie
It usually takes years of study and experience to
earn respect in the hacker community
It’s a hobby, a lifestyle, and an attitude
▪ A drive to figure out how things work
Hands-On Ethical Hacking and Network Defense 7
Hands-On Ethical Hacking and Network Defense 8
Tiger box
▪ Collection of OSs and hacking tools
▪ Usually on a laptop
▪ Helps penetration testers and security testers
conduct vulnerabilities assessments and attacks
Hands-On Ethical Hacking and Network Defense 9
White box model
▪ Tester is told everything about the network topology
and technology
▪ Network diagram
▪ Tester is authorized to interview IT personnel and
company employees
▪ Makes tester’s job a little easier
Hands-On Ethical Hacking and Network Defense 10
Black box model
▪ Company staff does not know about the test
▪ Tester is not given details about the network
▪ Burden is on the tester to find these details
▪ Tests if security personnel are able to detect an
attack
Hands-On Ethical Hacking and Network Defense 11
Gray box model
▪ Hybrid of the white and black box models
▪ Company gives tester partial information
Hands-On Ethical Hacking and Network Defense 13
Basics:
▪ CompTIA Security+ (CNIT 120)
▪ Network+ (CNIT 106 or 201)
14
CNIT 123: Ethical Hacking and Network
Defense
CNIT 124:Advanced Ethical Hacking
15
Issued by the International
Information Systems Security
Certifications Consortium (ISC2)
▪ Usually more concerned with
policies and procedures than
technical details
CNIT 125: Information Security
Professional Practices
Web site: www.isc2.org
Hands-On Ethical Hacking and Network Defense 16
SysAdmin,Audit, Network, Security (SANS)
Offers certifications through Global Information Assurance
Certification (GIAC)
Top 20 list
▪ One of the most popular SANS Institute documents
▪ Details the most common network exploits
▪ Suggests ways of correcting vulnerabilities
Web site
▪ www.sans.org (links Ch 1i & Ch 1j)
Hands-On Ethical Hacking and Network Defense 18
Laws involving technology change as rapidly as
technology itself
Find what is legal for you locally
▪ Laws change from place to place
Be aware of what is allowed and what is not
allowed
Hands-On Ethical Hacking and Network Defense 19
Tools on your computer might be illegal to
possess
Contact local law enforcement agencies before
installing hacking tools
Written words are open to interpretation
Governments are getting more serious about
punishment for cybercrimes
Hands-On Ethical Hacking and Network Defense 20
Some states deem it legal
Not always the case
Federal Government does not see it as a violation
▪ Allows each state to address it separately
Read your ISP’s “Acceptable Use Policy”
IRC “bots” may be forbidden
▪ Program that sends automatic responses to users
▪ Gives the appearance of a person being present
Hands-On Ethical Hacking and Network Defense 21
www.ccsf.edu/Policy/policy.shtml (link Ch 1k)
Hands-On Ethical Hacking and Network Defense 22
Federal computer crime laws are getting more
specific
▪ Cover cybercrimes and intellectual property issues
Computer Hacking and Intellectual Property
(CHIP)
▪ New government branch to address cybercrimes and
intellectual property issues
Hands-On Ethical Hacking and Network Defense 23
Hands-On Ethical Hacking and Network Defense 24
Accessing a computer without permission is illegal
Other illegal actions
▪ Installing worms or viruses
▪ Denial of Service attacks
▪ Denying users access to network resources
Be careful your actions do not prevent customers
from doing their jobs
Hands-On Ethical Hacking and Network Defense 25
Using a contract is just good business
Contracts may be useful in court
Books on working as an independent contractor
▪ The Computer Consultant’s Guide by Janet Ruhl
▪ Getting Started in Computer Consulting by Peter Meyer
Internet can also be a useful resource
Have an attorney read over your contract before
sending or signing it
Hands-On Ethical Hacking and Network Defense 26
What it takes to be a security tester
▪ Knowledge of network and computer technology
▪ Ability to communicate with management and IT
personnel
▪ Understanding of the laws
▪ Ability to use necessary tools
27
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview

Weitere ähnliche Inhalte

Was ist angesagt?

Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
webhostingguy
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
Bikrant Gautam
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

Was ist angesagt? (20)

NMAP
NMAPNMAP
NMAP
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
4 andrii kudiurov - web application security 101
4   andrii kudiurov - web application security 1014   andrii kudiurov - web application security 101
4 andrii kudiurov - web application security 101
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
 
Sql injections - with example
Sql injections - with exampleSql injections - with example
Sql injections - with example
 
Log Analysis
Log AnalysisLog Analysis
Log Analysis
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 

Ähnlich wie CNIT 123 Ch 1: Ethical Hacking Overview

Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
PacSecJP
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 

Ähnlich wie CNIT 123 Ch 1: Ethical Hacking Overview (20)

CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
CEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expertCEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expert
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
The Role of Security and Penetration Testers
The Role of Security and Penetration TestersThe Role of Security and Penetration Testers
The Role of Security and Penetration Testers
 
Foot printing and Reconnaissance Techniques
Foot printing and Reconnaissance TechniquesFoot printing and Reconnaissance Techniques
Foot printing and Reconnaissance Techniques
 
Ch01
Ch01Ch01
Ch01
 
Ch01
Ch01Ch01
Ch01
 
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
Ethical hacking   Chapter 1 - Overview - Eric VanderburgEthical hacking   Chapter 1 - Overview - Eric Vanderburg
Ethical hacking Chapter 1 - Overview - Eric Vanderburg
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.Ethical hacking: Safeguarding your digital world.
Ethical hacking: Safeguarding your digital world.
 
hacking
hackinghacking
hacking
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 

Mehr von Sam Bowne

Mehr von Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 

CNIT 123 Ch 1: Ethical Hacking Overview

  • 1. Chapter 1 Ethical Hacking Overview Last modified 1-11-17
  • 2. Hands-On Ethical Hacking and Network Defense 2 Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you cannot do as an ethical hacker
  • 3.
  • 4. Hands-On Ethical Hacking and Network Defense 4 Ethical hackers ▪ Employed by companies to perform penetration tests Penetration test ▪ Legal attempt to break into a company’s network to find its weakest link ▪ Tester only reports findings, does not solve problems Security test ▪ More than an attempt to break in; also includes analyzing company’s security policy and procedures ▪ Tester offers solutions to secure or protect the network
  • 5. Hands-On Ethical Hacking and Network Defense 5 Hackers ▪ Access computer system or network without authorization ▪ Breaks the law; can go to prison Crackers ▪ Break into systems to steal or destroy data ▪ U.S. Department of Justice calls both hackers Ethical hacker ▪ Performs most of the same activities but with owner’s permission
  • 6. Hands-On Ethical Hacking and Network Defense 6 Script kiddies or packet monkeys ▪ Young inexperienced hackers ▪ Copy codes and techniques from knowledgeable hackers Experienced penetration testers write programs or scripts using these languages ▪ Practical Extraction and Report Language (Perl), C, C++, Python, JavaScript,Visual Basic, SQL, and many others Script ▪ Set of instructions that runs in sequence
  • 7. This class alone won’t make you a hacker, or an expert ▪ It might make you a script kiddie It usually takes years of study and experience to earn respect in the hacker community It’s a hobby, a lifestyle, and an attitude ▪ A drive to figure out how things work Hands-On Ethical Hacking and Network Defense 7
  • 8. Hands-On Ethical Hacking and Network Defense 8 Tiger box ▪ Collection of OSs and hacking tools ▪ Usually on a laptop ▪ Helps penetration testers and security testers conduct vulnerabilities assessments and attacks
  • 9. Hands-On Ethical Hacking and Network Defense 9 White box model ▪ Tester is told everything about the network topology and technology ▪ Network diagram ▪ Tester is authorized to interview IT personnel and company employees ▪ Makes tester’s job a little easier
  • 10. Hands-On Ethical Hacking and Network Defense 10 Black box model ▪ Company staff does not know about the test ▪ Tester is not given details about the network ▪ Burden is on the tester to find these details ▪ Tests if security personnel are able to detect an attack
  • 11. Hands-On Ethical Hacking and Network Defense 11 Gray box model ▪ Hybrid of the white and black box models ▪ Company gives tester partial information
  • 12.
  • 13. Hands-On Ethical Hacking and Network Defense 13 Basics: ▪ CompTIA Security+ (CNIT 120) ▪ Network+ (CNIT 106 or 201)
  • 14. 14 CNIT 123: Ethical Hacking and Network Defense CNIT 124:Advanced Ethical Hacking
  • 15. 15 Issued by the International Information Systems Security Certifications Consortium (ISC2) ▪ Usually more concerned with policies and procedures than technical details CNIT 125: Information Security Professional Practices Web site: www.isc2.org
  • 16. Hands-On Ethical Hacking and Network Defense 16 SysAdmin,Audit, Network, Security (SANS) Offers certifications through Global Information Assurance Certification (GIAC) Top 20 list ▪ One of the most popular SANS Institute documents ▪ Details the most common network exploits ▪ Suggests ways of correcting vulnerabilities Web site ▪ www.sans.org (links Ch 1i & Ch 1j)
  • 17.
  • 18. Hands-On Ethical Hacking and Network Defense 18 Laws involving technology change as rapidly as technology itself Find what is legal for you locally ▪ Laws change from place to place Be aware of what is allowed and what is not allowed
  • 19. Hands-On Ethical Hacking and Network Defense 19 Tools on your computer might be illegal to possess Contact local law enforcement agencies before installing hacking tools Written words are open to interpretation Governments are getting more serious about punishment for cybercrimes
  • 20. Hands-On Ethical Hacking and Network Defense 20 Some states deem it legal Not always the case Federal Government does not see it as a violation ▪ Allows each state to address it separately Read your ISP’s “Acceptable Use Policy” IRC “bots” may be forbidden ▪ Program that sends automatic responses to users ▪ Gives the appearance of a person being present
  • 21. Hands-On Ethical Hacking and Network Defense 21 www.ccsf.edu/Policy/policy.shtml (link Ch 1k)
  • 22. Hands-On Ethical Hacking and Network Defense 22 Federal computer crime laws are getting more specific ▪ Cover cybercrimes and intellectual property issues Computer Hacking and Intellectual Property (CHIP) ▪ New government branch to address cybercrimes and intellectual property issues
  • 23. Hands-On Ethical Hacking and Network Defense 23
  • 24. Hands-On Ethical Hacking and Network Defense 24 Accessing a computer without permission is illegal Other illegal actions ▪ Installing worms or viruses ▪ Denial of Service attacks ▪ Denying users access to network resources Be careful your actions do not prevent customers from doing their jobs
  • 25. Hands-On Ethical Hacking and Network Defense 25 Using a contract is just good business Contracts may be useful in court Books on working as an independent contractor ▪ The Computer Consultant’s Guide by Janet Ruhl ▪ Getting Started in Computer Consulting by Peter Meyer Internet can also be a useful resource Have an attorney read over your contract before sending or signing it
  • 26. Hands-On Ethical Hacking and Network Defense 26 What it takes to be a security tester ▪ Knowledge of network and computer technology ▪ Ability to communicate with management and IT personnel ▪ Understanding of the laws ▪ Ability to use necessary tools
  • 27. 27