Computer Security Fundamentals

Slides:



Advertisements
Similar presentations
10,000 Issues Testing In a Tough Economy Jonathan Miller Director, Global Channel Sales & Development Pearson VUE Ryan Ulwelling Manager, Global PVTC Selects.
Advertisements

Computer Security and Penetration Testing
System Security Scanning and Discovery Chapter 14.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Hands-On Ethical Hacking and Network Defense
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Chapter 1 Computer Networks and the Internet. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 1-2.
Computer Security and Penetration Testing
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Computer Security Fundamentals
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
Computers Are Your Future Eleventh Edition Chapter 10: Careers & Certification Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Tenth Edition Chapter 10: Careers & Certification Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
SATAN Presented By Rick Rossano 4/10/00. OUTLINE What is SATAN? Why build it? How it works Capabilities Why use it? Dangers of SATAN Legalities Future.
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.
Network Security Management Tools. MCNS—Network Security Management Tools—17-2 Copyright  1998, Cisco Systems, Inc. Objectives Describe security vulnerability.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Management Chapter 12. Learning Objectives Describe the purpose of data collection and reporting. Identify the data that should be collected.
IS Network and Telecommunications Risks Chapter Six.
Security Assessment Tools Paula Kiernan Senior Consultant Ward Solutions.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Prototyping the Campus Network Designing and Supporting Computer Networks.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
Wharton Computer Consulting, Inc. PowerShell Basics for SQL Server One Tool to Manage All SQL Servers Michael Wharton
Network Devices and Firewalls Lesson 14. It applies to our class…
Chapter 17 Windows NT/2000 Domains Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Information Technology Part 2. Part2-2 Next Three Chapters Copyright © 2016 Pearson Education, Inc. Chapter 4 discusses hardware, software, and mobile.
Job offer IT Infrastructure Specialist We are currently looking for an IT infrastructure specialist in order to respond to one key-account customer demand.
SEC 420 UOP professional tutor / sec420dotcom.  SEC 420 Entire Course (UOP)  SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
10-1 Copyright © 2014 Pearson Education, Inc. publishing as Prentice Hall Chapter 10 Understanding and Planning Reports and Proposals.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Computer Security Fundamentals
Outline Securing your system before the IDS and some tools to help you
Administrative Details
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Computer Security Fundamentals
Technology, Careers, and Job Hunting
Computer Security Tools.
CIS 333Competitive Success/tutorialrank.com
CIS 333 RANK Lessons in Excellence-- cis333rank.com.
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
Information Systems Management
Information Technology
Information Technology
Chapter 5: Will Your Future Be in Cybersecurity?
Behavioral Assessment: Initial Considerations
Material being covered 3/11
Presentation transcript:

Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

Chapter 11 Objectives Understand how to secure a system Probe a system for vulnerabilities Use Vulnerability vulnerability scanning tools Evaluate potential security consultants Understand and be able to conduct basic system reconnaissance. Describe and use several port scanners. Understand how to derive useful information about a Web site from internic or the Netcraft Web site. Know how to locate useful information about a system or organization from Internet newsgroup postings. Understand the use of vulnerability scanners. Use port monitoring utilities. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Introduction Secure the system. The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Basics of Security Ports Protect Policies Probe Physical The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

MBSA Microsoft Baseline Security Analyzer The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Nessus Popular Vulnerability Scanner The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Getting Professional Help Certification Education Experience Background Checks The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Certifications CEH CISSP Security+ Vendor-specific (Microsoft, Cisco, and so on) GAIC © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Education Computer Science Engineering Computer Information Systems Security Degrees © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Background and Experience Prior Security Experience Criminal Background Check Credit Check References Check © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning

Summary Information The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it. The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated. The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning