Free Essay

Rootkit Technology Analysis

In:

Submitted By christy5
Words 2465
Pages 10
Table of Contents
CHAPTER 1 …………………………………………………………………….. 4 INTRODUCTION………..……………………………………………………….4Aim & Objective of Research …………………………………………………..4
Research Questions …………………………………………………………….5
Hypothesis ………………………………………………………………………..5
CHAPTER 2 ……………………………………………………………………...6
LITERATURE REVIEW …………………………………………………………6
Overview of Rootkit Technology ……………………………………………….6
How a Rootkit Functions ….……………………………………………………6
Functionality Approaches of Rootkit ……………………………….…………..7
Types of Rootkit ………………………………………………………………….8
CHAPTER 3 …………………………………………………………………….11
DISCUSSION ………………………………………………………………….11
Rootkit Detection & Prevention ……………………………………………….11
Rootkit Prevention & Removal Approaches …………………………………12
Rootkit Detection & Prevention Tools ………………………………………..13
CHAPTER 4 …………………………………………………………………….14
CONCLUSION……………………………………………………………..……14
CHAPTER 5 ………………………………………………………….…………15
REFERENCES …………………………………………………………………15

EXECUTIVE SUMMARY
This research paper is divided into 5 main chapters like introduction, literature review, discussion, conclusion and references. The major points of this detailed research are summarized as below. * Rootkit technologies cause severe security attacks in today’s cyber world. This research discusses the significance of effective security strategies that should be formulated against security attacks. * Detailed analysis of rootkit technologies and functionalities are done. Different rootkit types, attack tools and approaches are analyzed. * Several rootkit detection & prevention systems are evaluated for preventing these security attacks effectively. Various rootkit prevention tools and methodologies analyzed as well. * This research paper concludes with the significance of effective security tactics against rootkits. Utilization of rootkit technology for legitimate purpose is also recommended.

A CRITICAL ANALYSIS OF ROOTKIT TECHNOLOGIES
CHAPTER 1: INTRODUCTION
Majority of people make use of computer & internet technologies in day to day life. Around 80% of world population use several gadgets and online services nowadays. Obviously, security plays an important role in such a complex hi-tech world. There are several security attacks & malware functions that may causes severe damage to entire computer network. Most of the attackers use highly sophisticated approaches to conduct attack on vulnerable resources (McGraw, 2006). Hidden or undetected attacks are most complex ones since the attacker may use some stealth software here. Rootkit is similar software that helps to carry out cyber attacks in hidden mode. This software can comprise a system through its stealth mode capabilities and backdoor operations (Vieler, 2007). The longer rootkit can comprise a system, the larger the attacker can make damage.
It is not an easy task for any security professionals when they are unaware of the malware techniques. Every cyber security professional should be alert about security related threats & vulnerabilities. In-depth analysis of various rootkit technologies helps them to devise some effective protection mechanisms against these attacks (Carrier, 2005). This research paper discusses about some technological aspects of rootkits, diagnostic approaches towards rootkit attack and its prevention techniques.
Aim & Objective of research
The primary aim of this comprehensive project is to analyse some rootkit technologies for preparing successful security defence mechanisms. This research paper helps to evaluate attacker’s skills & motive and thereby improving the overall system and network security.
Major objective of this research are below. * Study of rootkit technologies and tools. * Analysis of rootkit approaches like stealth mode, data modification, etc. on Linux and Windows platforms. * Study of rootkit detection & preventions tools and methods. * Analysis of rootkit utility for legitimate programs.
Research Questions
Following is a list of research questions that helped in the progress this project during each stage of research. * How a rootkit works? * What are different types rootkit and how do they affect the system? * Which are the main rootkit detection & prevention tools? * What are the different types of approaches for rootkit detection & prevention? * How to increase the system security against rootkit?
Hypothesis
Rootkit technologies have sophisticated hidden attack modes that may result in severe damage. Through proper use this technology can be used for some legitimate applications & programs, and thereby improve the protection strategies.

CHAPTER 2: LITERATURE REVIEW
Literature review discusses about overview of rootkit technology, and its operational aspects in detail.
Overview of Rootkit Technology
Rootkit is the term that indicates a set of software tools that gain the administrative root privilege in an illicit manner (Butler & Hoglund, 2005). Administrative root of a system has greatest significance since it is the most authoritative component of a computer that deals with operating systems. An attacker exploits system vulnerabilities through rootkit so that he/she gets an unauthorized access to the targeted system (Skoudis & Zeltser, 2004). This unauthorized user can modify the security spectrum as well, and hence authorized user cannot understand this security breach easily. Rootkit can gain access to high privileged system processes or files, and modify them. Rootkit replaces the system executable files, and thereby hiding the modifications. Rootkit accesses computer hardware, and eventually take control over operating system. Obscure nature of rootkit functioning makes it more difficult to trace its visibility. Most of the OS security settings and antivirus settings cannot detect any unusual modification caused by these tools (Blunden, 2009).
How a Rootkit Functions
Understanding of rootkit functioning is significant aspect of this research. As the definition says rootkit is a set of software codes or programs which make some undetectable modifications in a system (Butler & Hoglund, 2005). Most of the rootkit follows penetration & modification strategy. Modified files and processes generate an incorrect output. When we scan a system using some antivirus or antispyware software, then system generates an API (Application Programming Interface) call (Vieler, 2007). API calls generally request specific network or OS services. When rootkit access a system, it acts as a filter, and returns a list of unaffected files or services. Hence most of the infected files remain hidden. Several rootkit tools use IAT/EAT hooking functions to create undetectable processes. This helps the attacker to access data without getting noticed.

1.1 Rootkit Infected System

Above picture shows the response of rootkit infected system while an antivirus software scans it.
Functionality Approaches of Rootkit
Rootkit has capability to install ‘backdoor’ in the targeted system so that it can easily gain access (Butler & Hoglund, 2005). It compromises the login mechanism through sneaky login combination. Rootkit mainly uses 3 stages of functionality approaches. 1. Gaining & maintaining access 2. Attacking system and its resources 3. Destroying evidence
Gaining & maintaining access is the first stage in rootkit exploitation. It can be either through local or remote backdoor installation. Remote backdoor installations work in LAN connection only. Following are commonly used remote tool approaches. * Telnet or shell on a TCP port * CGI shell * Secure shell (SSH), regular or trojaned on high port * ICMP telnet * UDP listener * Reverse tunneled shell * Reverse shell/telnet
Rootkit software package consists of some attack tools to conduct successful attacks. Mainly 3 types of attack tools are used in rootkit. * Local attack tools – Local attack tools are used in LAN connections mostly. This attack recaptures the administrative root privilege of a compromised system, and modifies it (Blunden, 2009). Commonly used local attack tools are password sniffers that have capacity to capture text protocols in a LAN. The attacker creates chaos in targeted network, and analyses the transmitted data over network. Detained data is converted into decrypted format using some decryption tools. * Remote attack tools – Remote attack tools include some network noise creating tools like autorooters and scanners. AWU is such a mass exploitation remote tool that creates several noises over LAN perimeters (Blunden, 2009). It identifies the vulnerabilities of a system by utilizing the IP classifications. * DoS attack tools – This tool uses flood attacks to gather sensible information. Reflexive DoS attacks, spoofed flood attacks, DNS response floods, etc. are main tools here.
Destroying evidence is a critical stage of rootkit functioning. This stage eliminates pre-attack evidences, and prevents the formation of any new evidence (Carrier, 2005). It includes destruction of affected log files, audit traces, shell histories and application traces. The simplest method of evidence destruction is log file elimination and editing. Following is an example of rootkit technology that remains hidden while working.

1.2 Hidden Rootkit Program in a System

Types of Rootkits
Rootkits are divided into two categories according to its functionality. User-level rootkits and kernel-level rootkits. Kernel level rootkits are more functional and destructive in nature (Vieler, 2007). Rootkits are categorized as 3 types according to their behavioural changes. They are following. 1. Binary rootkits – These are the first rootkits used to replace system binaries like /bin/login. Generally binary rootkits are used for local or remote access and evidence removal. This rootkit exploits Trojan infected executable files to perform malicious activities. 2. Kernel rootkits – Kernel rootkits are set of malicious modules in kernels that are capable of several system call modifications. It seriously affects the UNIX operating system, since this OS has separate user & kernel mode, and hence it is critically vulnerable to kernel rootkits. 3. Library rootkits – These rootkits are known as Library Trojan rootkits since it uses Trojan infected library functions to conduct the attack (Altholz & Stevenson, 2006). T0rn 8 is a well known rootkit in this category. Library rootkits use some library functions such as libproc.a, glibc/libc, etc. to modify system’s main library functions.

CHAPTER 3: DISCUSSION
Rootkit Detection & Prevention
Rootkit detection is a tedious task. Generally there are 8 types of detection approaches used mainly. 1. Execution Path Analysis (EPA) Approach – EPA technique traps the profile system calls and analyses them. During learning period of EPA, system stores the exact system call counts & code paths. So it can detect the unusual system calls or instructions when rootkit affects. 2. Anti-virus Software Approach – This is the most effective rootkit detection approach. In anti-virus approach, new code paths are stored as new variants. Hence anti-virus software detects the presence of some new variants while rootkit start to operate. This detection approach starts to work at early stages of infections. 3. Differential Testing Approach – Differential testing is a new detection approach, which uses query based handling to detect rootkits (Skoudis & Zeltser, 2004). Similar query manipulations are taking place at each level, and occurrence of dissimilar results indicates the chance of an attack. 4. Host Intrusion Detection Approach – Host intrusion detection uses two layers of detection system against rootkit technologies. Two defensive layers can detect the attacks and prevent further kernel attacks. 5. Signature Based Detection Approach – This detection mechanism make use of a set of already known signatures and patterns for checking unusual behaviours (Altholz & Stevenson, 2006). Signature based approach is fast since it need to analyze a limited no. of signatures only. 6. Anomaly Based Detection Approach – Anomaly based detection approach uses continuous evaluation of system behaviours to find out affected rootkits. It observes behaviour patterns of system calls & files, and compares these results with earlier ones. 7. Virtual Machine Technology Approach – In this approach virtual machine technology is used to facilitate VM introspection capacity. There is a hardware independent host OS to monitor every event in the guest OS. This monitoring process is known as introspection. Presence of virtualization layer in this technology makes it inaccessible to attacker. 8. Automated Defence Approach – This detection approach uses a set of 3 defence mechanisms such as Prevention & Detection, Tracking and Containment (Skoudis & Zeltser, 2004). Automated defense approach consists of protected zone to prevent unauthorized access; efficient tracking systems to maintain steady OS & object relationships; and control mechanism to prevent system damage.
Rootkit Prevention & Removal Approaches
Kernel rootkits act as a biggest threat to technology since they access high privilege administrative root without effortless detection. A successful rootkit prevention approach should take place before the rootkit start to work (Butler & Hoglund, 2005). Obviously, it is a time consuming task that evaluates rootkit execution from its beginning. Following are three significant types of rootkit prevention & removal methods. 1. Signature Based Prevention Approach – This approach is similar to fingerprint comparison method in which each sequence of bytes in a system file is compared with another sequence of bytes in a malicious program (Altholz & Stevenson, 2006). It uses a simple principle; however, it is a tedious task. Signature based approach is quite effective in determining known attacks. Still it has several loopholes for new or unknown attacks. 2. Heuristic Based Prevention Approach – Heuristic based prevention approach uses system behavior comparisons to prevent rootkit attack (Skoudis & Zeltser, 2004). Here evaluates different system behaviors and attack behaviors by comparing the execution paths. Compared to signature based approach, this prevention method has more possibility for false positives. However, this approach is quite effective against latest and unknown threats. 3. Integrity Check Prevention Approach – This approach works best with digital signatures. Here continuously evaluates the trusted base line of some specific system files to ensure security. This prevention approach can effectively prevent some complicated rootkit techniques. System virginity checker and tripwire are two effective prevention tools in this category. 4. Cross View Based Prevention Approach – It is a well known rootkit prevention approach used by several anti-root kit programs. It compares both high level and low level view of a system. If compared results have mismatch content, then it indicates the presence of some malicious activity (McGraw, 2006). This approach can detect hidden programs, files, modified registry keys, etc.
Rootkit Detection & Prevention Tools
There are several rootkit detection & prevention tools available today. Some of them are listed following. * Tripwire * Hijacking anti-rootkit software * Memory shadowing software * VICE * System virginity verifier * GMER anti-rootkit * NICKLE prevention software

CHAPTER 4: CONCLUSION
Rootkits are biggest threat of cyber security world today. Most of the standard detection mechanisms have insufficient capabilities to trace them. Majority of people depend on online services for several transactions and other data services. It is not possible to take some baggy security procedures in such circumstances. Rootkits seriously affects a multinational company or an end-user in similar way. Rootkit technologies like Stuxnet are greatest threat to industries in every way.
A comprehensive knowledge of rootkits is necessary for successful detection as well as prevention. Good understanding of rootkit functionalities enables a security professional to prepare some effective counter measures against these cyber attacks. It helps in successful data leak prevention, efficient data filtering, and effective system monitoring. We can utilize this multi-usage technology for some legitimate programs. Rootkits have several backdoor utilities and monitoring programs that can be used for high-end uses.

CHAPTER 5: REFERENCES 1. Altholz, N., Stevenson, L. (2006). Rootkits for Dummies (pp.142-217). New Jersey: John Wiley & Sons. 2. Blunden, B. (2009). The Rootkit Arsenal: Escape and Evasion (pp. 37-113). United States: Jones & Bartlett Learning. 3. Butler, J., Hoglund, G. (2005). Rootkits: Subverting the Windows Kernel (pp.27- 251). Boston: Addison-Wesley. 4. Carrier, B. (2005). File system forensic analysis (pp. 431-464). Boston: Addison-Wesley. 5. McGraw, G. (2006). Software Security: Building Security In (pp.267-308). Boston: Addison-Wesley. 6. Skoudis, E., Zeltser, L. (2004). Malware: Fighting Malicious Code (pp. 198-312). United States: Prentice Hall Professional. 7. Vieler, R. (2007). Professional Rootkits (pp. 56-97). New Jersey: John Wiley & Sons.

Similar Documents

Free Essay

Mister

...Elias N. Khan Prof. Session CRJ 115 7 December 2015 Packet Sniffers: A Bittersweet Software Packet sniffing software is a controversial subject and a double-edged sword. It can be used to analyze network problems and detect Internet misuse. But at the same time, it allows hackers and people with malicious intention to "sniff" out your password, get your personal information, and invade your privacy. That is also why securing and encrypting data is so important. In this paper, the definition of packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave & Buster's, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. A packet sniffer is "a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network" (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening...

Words: 2443 - Pages: 10

Free Essay

Uefi

...Title: Paper #1 Forensic Analysis of UEFI by Pui Yee (Pearl) Pang Pearl.pang.py@gmail.com By submitting this assignment I acknowledge that I have read and agree to abide by the Champlain College Academic Honesty Policy. I declare that all work within this assignment is my own or appropriately attributed. I accept that failure to follow the academic honesty policy may result in a failure grade, or expulsion from Champlain College. Date Due: _11/4/2015___ Date Submitted:_11/4/2015__ Abstract The Unified Extensible Firmware Interface (UEFI) Specification is an interface between the operating system (OS) and the platform firmware and is managed through the UEFI forum, a collection of chipset, hardware, system, firmware, and operating system vendors. One of many benefits of using UEFI is that it provides a more secure environment during the boot process by adding several security mechanisms such as secure boot, and update. With the added secure boot feature, the correct bootloader certification is needed and database key authentication is also required before the booting process. As a result, rootkit or other malware program have a hard time hijacking the boot process and concealing itself from the operating system. This paper will focus on the analysis of UEFI's secure boot feature and its implications and challenges for digital investigators conducting computer forensic investigation. Keywords: UEFI secure boot, boot firmware, malware, rootkit. Introduction To...

Words: 1677 - Pages: 7

Premium Essay

Security Updates for Malware

...Security Updates for Malware and Anti-virus Protection Security for the remote sites needs to be a top priority, due to the recent Malware infection at one of the sites this is an area that needs to be addressed. The Anti-virus software on the client computers is another issue that needs to be updated. After discussing the situation with the different employees, the following recommendations should be implemented to ensure the future security of each of the sites. Recommendations include firewalls, software security for viruses and malware, and remote access for automatic updates. Firewalls are programs that keep out hackers, viruses, and worms from reaching the computers of employees. There are 2 types of firewalls, a hardware firewall and a software firewall. Commercial software firewalls are usually more powerful than those that come with the operating system. These are installed on each computer from a CD or by downloading it from the internet. Hardware firewalls is a physical device that attaches to the computer and is configured through a cable connection. A hardware router installed between client computers and the internet will help with external security issues. A software firewall should also be installed on each computer to prevent the spread of viruses that might infect the network if a computer becomes infected. Firewalls work by closing ports that are unused by the computers and regulating the traffic in ports that are used by the computer. Several firewalls...

Words: 1342 - Pages: 6

Premium Essay

Nt1310 Unit 3 Assignment 1

...Over the last two decades, the information technology field has evolved at a rapid rate for a field of work that is quite new in contrast to most service and development sectors that have been in existence. As opposed to these firmly and long-established industries, information technology has attained acceptance in all areas of life, to include personal and business use, with breathtaking speed that it is almost impossible to identify something that does not rely on it. This increased dependency on technology does have limits, though, when analyzing for security to protect users from malicious actors who will attempt to exploit vulnerabilities to access data and information. With incredible amounts of information that is electronically accessible,...

Words: 1263 - Pages: 6

Premium Essay

Crm and Impact

...Executive summary The organization information system is backbone of organizational operational and functional units, the malware can produce potential threat to organization image, the establishment of an effective security measures and reassessment of organizational risk management approaches in order to cater with latest implication trend in network security. This report is based on literature review, analytical analysis of case studies, news articles magazines to highlight vulnerability and implication of malware attack to an organization, highlights the salient features of malware attack, malware attacks that can significantly hurt an enterprise information system, leading to serious functional commotions, can result into destructing the basic IT security up to identity theft, leakage of data, stealing private information, corporate information system blue prints, industrial white papers and networks break down. The only constant in the world of technology is a change, report highlights the latest trends, dimension and implication of malware attack and new critical source of threats, within the perspective of constantly changing IT world (e.g. cloud services-integration) Enterprise may not effectively device and manage malware threat and 'risk assessment processes. This report highlight the malware propagation process, malware vulnerability, the types of malware, optimistic cost effective solution in order to minimize security risk for an Enterprise information...

Words: 3648 - Pages: 15

Premium Essay

Essay

...Executive Summary The role of the management information system is described and analyzed in the light of its Decision-making ability. Decision-making process and its impact on senior management In organizations with automated decision, focus explanation. Challenges restrictions and management information systems are discussed and a set of six recommendations put forward in the decision-making process to increase the effectiveness of MIS. 1.0 Introduction It is an integrated information system to collect store and process data and provide information, knowledge and digital product components. Commercial enterprises and other organizations rely on information systems to manage and conduct their business, interact with customers and suppliers, and market competition. Supply chain and information systems for the electronic operation of the market organizations. For example, companies use information systems to handle financial accounts to manage their human resources, and with online promotions, in order to reach their potential customers. Many large companies around the information system is fully established. 1.1 The five components of information are: i. Hardware: a. The term refers to the mechanical hardware. This category includes the computer itself, which is commonly referred to as a central processing unit (CPU), and all the support equipment. b. Support equipment between the input and output devices, storage devices and communications equipment...

Words: 2669 - Pages: 11

Free Essay

Csec 610 Final Exam

...could be used to spy on users, the first thing I would install would be a rootkit. A rootkit is a clandestine kind of software that is designed to conceal that fact that an operating system has been compromised. They ultimately allow viruses and malware to hide from usual methods of detection, and permits continued privileged access to a computer. Rootkits allow for full control over a system, which means that existing software can be modified including detection software. Rootkit detection is difficult because a rootkit is activated before the operating system boots up and is able to subvert the software intended to find it (Vacca, 2013, pp. 53-54). The next step would then be to install spyware and use the rootkit to disguise it as necessary files that anti-spyware software will overlook. Once a user purchases this product and it is connected, off-site agents will be able to start collecting files and data and have the ability to access and control the infected devices. b) As a technology procurer for an organization, it is very important to do your research on your vendors. The legitimacy of the vendor needs to be verified and their workforce, production lines and supply chains need to be checked to ensure they have appropriate security measures and monitoring in place to safeguard against malicious activity. A security vulnerabilities assessment needs to be done on all new information technologies to ensure it meets the requirements for the organization’s IT security policies...

Words: 5301 - Pages: 22

Premium Essay

Malware

...A Brief History “In 1949, Von Neumann established the Theory of Self-Reproducing Automata, where he presented for the first time the possibility of developing small replicating programs able to control other programs with a similar structure In 1959, in Bell Computer’s laboratories, three young programmers: Robert Thomas Morris, Douglas Mcllroy and Victor Vysottsky created a game called CoreWar, based on the theory of Von Neumann and in which programs fought between each other, trying to occupy as much memory as possible and eliminating opposing programs. This game is considered the precursor to computer viruses. In 1972, Robert Thomas Morris created the first virus as such: Creeper, which could infect IBM 360 on the ARPANET (the predecessor of the Internet) and show an on-screen message saying “I’m the creeper, catch me if you can”. To eliminate it, a virus called Reaper was created to search for it and destroy it”…………………...PANDA SECURITY ( 2011) Malware Overview Retrieved from http://www.google.com/images?rlz=1T4ADFA_enUS391US392&q=virus+clipart&um=1&ie=UTF-8&source=univ&sa=X&ei=nOx7TfqZEoXorAGvu5zCBQ&ved=0CDMQsAQ&biw=1174&bih=463 Malicious software, better known as Malware, is the most sophisticated type of threat to a computer system. Malware is simply code that is designed with purpose and intent to destroy, steal, disrupt or damage someone’s data, computer system or network. Malware is software that is written...

Words: 3874 - Pages: 16

Premium Essay

It255

...Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System CNS Program Prerequisites: ment 300 Level IT320 WAN Technology &...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18

Premium Essay

Ethical Hacking

...hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically important. One area that is very promising is penetration testing or Ethical Hacking. The purpose of this paper is to examine effective offerings within public and private sectors to prepare security professionals. These individuals must be equipped with necessary tools, knowledge, and expertise in this fast growing proactive approach to information security. Following this examination a...

Words: 6103 - Pages: 25

Premium Essay

Test

...implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security...

Words: 2305 - Pages: 10

Premium Essay

Ethical Hacking

...are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones who are trying hard to keep information secured and the ones who are trying to get prohibited access to these information. Securing an information technology environment does not just consist of a bunch of actions which can be taken and then everything can be forgotten – there is no fire and forget solution - security is a never ending process. It is not very difficult to prevent these kinds...

Words: 8365 - Pages: 34

Free Essay

Top Security Threats

...Top Security Threats Craig Gagne’ IS317: Hacker Techniques Tools and Incident Handling 12/15/2013 Hany Othman The report highlights dramatic increases in targeted attacks on enterprises; the continued growth of social networking sites as an attack distribution platform; and a change in attackers’ infection tactics, increasingly targeting vulnerabilities in Java to break into traditional computer systems. In addition, the report explores how attackers are exhibiting a notable shift in focus toward mobile devices. Targeted attacks Targeted attacks such as Hydraq and Stuxnet posed a growing threat to enterprises in 2010. To increase the likelihood of successful, undetected infiltration into the enterprise, an increasing number of these targeted attacks leveraged zero-day vulnerabilities to break into computer systems. Stuxnet and Hydraq teach future attackers that the easiest vulnerability to exploit is our trust of friends and colleagues. Stuxnet could not have breached its target without someone being given trusted access with a USB key. Meanwhile, Hydraq would not have been successful without convincing users that the links and attachments they received in an email were from a trusted source. Social Networks Social network platforms continue to grow in popularity and this popularity has not surprisingly attracted a large volume of malware. One of the primary attack techniques used on social networking sites involved the use of shortened...

Words: 727 - Pages: 3

Premium Essay

Next Generation Firewall

...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a...

Words: 3381 - Pages: 14