Loading previews...
Principles of Penetration Testing
HTML
|
View |
Principles of Penetration Testing |
1 file in this resource
Summary: | The digital revolution has transformed the way we go about our daily lives. The freedom to do countless activities online, such as shopping or socializing, has become an integral part of what we now want and expect. The promise of the digital revolution is the freedom for users to do more and enjoy more in every aspect of their daily lives, at work, at home or on the go. However, the evolution of these technologies has focused (and still focuses in many cases) on ease of use. Since the first development of the Internet protocols, security solutions have been developed as add-ons to the existing, inherently insecure, standards. Many cases of this exist, with the TCP/IP protocol suite being the primary example. This has made it easier for criminals and malicious users to exploits existing systems. Additionally, the decreasing level of skill required for the launching of attacks, has made it easier for the not so technically gifted malicious users to perform these activities successfully. Training on networking and system hacking is freely available online. Many books are being written on the subjects. Excellent and easy to use hacking tools can easily be obtained. Because of this the need for cybersecurity professionals has increased continuously. Information security has to be applied to every system connected to the Internet. The extent to which a system needs to be secure varies according to the value of the information we are trying to secure. This module attempts to introduce students to the world of cybersecurity. In particular, the module focuses on teaching basic principles of Penetration Testing. To achieve this, it begins by explaining in brief and simple terms a common methodology used to perform ethical hacking against target systems. Subsequently, each phase of the methodology is described in depth, with practical examples. Then, it continues by exploring different types of defenses that can be applied against cyber-attacks. Additionally, several other topics are covered such as legal & ethical issues related to cyber security, social engineering, and more. |
---|---|
Creators: | |
Divisions: | Academic > School of Computing, Engineering and Built Environment > Department of Computing > Computing |
Copyright holder: | Copyright © Glasgow Caledonian University |
Tags: | Hacking, Penetration Testing |
Viewing permissions: | World |
Depositing User: | |
Date Deposited: | 06 Jul 2018 11:09 |
Last Modified: | 13 Feb 2020 12:03 |
URI: | https://edshare.gcu.ac.uk/id/eprint/3826 |
Actions (login required)
View Item |
Toolbox
There are no actions available for this resource.