Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.

Slides:



Advertisements
Similar presentations
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Troubleshooting Accessing the WAN – Chapter 8.
Computer Security and Penetration Testing
System Security Scanning and Discovery Chapter 14.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Hands-On Ethical Hacking and Network Defense
Vulnerability Analysis Borrowed from the CLICS group.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Chapter 1 Computer Networks and the Internet. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. 1-2.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Computer Security and Penetration Testing
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Computer Security Fundamentals
Network Vulnerability Scanning Xiaozhen Xue Dept. of Computer Science Texas Tech University, USA Akbar Siami Namin Dept. of Computer.
Computer Security Fundamentals
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Comp 8130 Presentation Security Testing Group Members: U Hui Chen U Ming Chen U Xiaobin Wang.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
IT:Network:Microsoft Applications
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Professional Business Ethics © 2000 South-Western Educational Publishing Introduction to Business Ethics Ethics The principles of right and wrong that.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Security+ Brian E. Brzezicki. About Me Instructor Brian E. Brzezicki Bachelor of Science, Computer.
Security Assessment Tools Paula Kiernan Senior Consultant Ward Solutions.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Introduction to Information Security
New Mexico State University Information Engineering Technology Bachelor of Science Engineering Technology.
Network Security Audit By David Liu University of Plymouth.
Information and communication technology (ICT) careers  What are information technology careers?  Working with computers and/or communication technologies.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Prototyping the Campus Network Designing and Supporting Computer Networks.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge.
SECURITY ANALYSIS TOOLS FOR INFORMATION MANAGEMENT Alicia Coon.
Chapter 17 Windows NT/2000 Domains Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Computer Security Fundamentals
Outline Securing your system before the IDS and some tools to help you
312-50v9: Certified Ethical Hacker Exam V9
© 2015 Pearson Education, Inc.
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
© 2015 Pearson Education, Inc.
Chapter 1: Introduction
Computer Security Fundamentals
Information Technology
Chapter 3 Careers in Healthcare
Chapter 5: Will Your Future Be in Cybersecurity?
Ethical Hacking.
Cyber Up! Digital Forensics & Incident Response Tobi West
The University of Adelaide, School of Computer Science
Presentation transcript:

Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 2 Chapter 11 Objectives Understand how to secure a system Probe a system for vulnerabilities Use Vulnerability vulnerability scanning tools Evaluate potential security consultants Understand how to secure a system Probe a system for vulnerabilities Use Vulnerability vulnerability scanning tools Evaluate potential security consultants

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 3 Introduction Secure the system.

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 4 Basics of Security Ports Protect Policies Probe Physical

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 5 MBSA Microsoft Baseline Security Analyzer

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 6 Nessus Popular Vulnerability Scanner

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 7 Getting Professional Help Certification Education Experience Background Checks

Certifications CEH CISSP Security+ Vendor-specific (Microsoft, Cisco, and so on) GAIC © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 8

Education Computer Science Engineering Computer Information Systems Security Degrees © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 9

Background and Experience Prior Security Experience Criminal Background Check Credit Check References Check © 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 10

© 2012 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning 11 Summary Information  The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it.  The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated.  The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes.