Cyber Defense and Penetration Testing: Week 1 - Principles of Penetration Testing

LoadingLoading previews...
Principles of Penetration Testing
HTML Creative Commons: Attribution-Noncommercial-No Derivative Works 4.0
View
    Principles of Penetration Testing
    Principles of Penetration Testing
    1 file in this resource
    Summary: The digital revolution has transformed the way we go about our daily lives. The freedom to do countless activities online, such as shopping or socializing, has become an integral part of what we now want and expect. The promise of the digital revolution is the freedom for users to do more and enjoy more in every aspect of their daily lives, at work, at home or on the go. However, the evolution of these technologies has focused (and still focuses in many cases) on ease of use. Since the first development of the Internet protocols, security solutions have been developed as add-ons to the existing, inherently insecure, standards. Many cases of this exist, with the TCP/IP protocol suite being the primary example. This has made it easier for criminals and malicious users to exploits existing systems. Additionally, the decreasing level of skill required for the launching of attacks, has made it easier for the not so technically gifted malicious users to perform these activities successfully. Training on networking and system hacking is freely available online. Many books are being written on the subjects. Excellent and easy to use hacking tools can easily be obtained. Because of this the need for cybersecurity professionals has increased continuously. Information security has to be applied to every system connected to the Internet. The extent to which a system needs to be secure varies according to the value of the information we are trying to secure. This module attempts to introduce students to the world of cybersecurity. In particular, the module focuses on teaching basic principles of Penetration Testing. To achieve this, it begins by explaining in brief and simple terms a common methodology used to perform ethical hacking against target systems. Subsequently, each phase of the methodology is described in depth, with practical examples. Then, it continues by exploring different types of defenses that can be applied against cyber-attacks. Additionally, several other topics are covered such as legal & ethical issues related to cyber security, social engineering, and more.
    Creators:
    Divisions: Academic > School of Computing, Engineering and Built Environment > Department of Computing > Computing
    Copyright holder: Copyright © Glasgow Caledonian University
    Tags: Hacking, Penetration Testing
    Viewing permissions: World
    Depositing User:
    Date Deposited: 06 Jul 2018 11:09
    Last Modified: 13 Feb 2020 12:03
    URI: https://edshare.gcu.ac.uk/id/eprint/3826

    Actions (login required)

    View Item View Item

    Toolbox

    There are no actions available for this resource.