The ethical hack : a framework for business value penetration testing /: a framework for business value penetration testing. (2005)
- Record Type:
- Book
- Title:
- The ethical hack : a framework for business value penetration testing /: a framework for business value penetration testing. (2005)
- Main Title:
- The ethical hack : a framework for business value penetration testing
- Further Information:
- Note: James S. Tiller.
- Other Names:
- Tiller, James S
- Contents:
- INTRODUCTION; Perspectives of Value; ; SECURITY AND HACKING; Information Security; Security Architecture; Hacking Impacts; ; THE FRAMEWORK; Business Planning and Operations; Reconnaissance; Enumeration; Vulnerability Analysis; Exploitation; Final Analysis; Deliverable; Integration; ; INFORMATION SECURITY PROGRAM; Scope of Information Security Programs; The Process of Information Security; Component Parts of Information Security Programs; ; BUSINESS PLANNING AND OPERATIONS; Business Objectives; Security Policy; Previous Test Results; Business Challenges; The Business of Security; Reasoning; Overall Expectations; How Deep is Deep Enough?; Timing is Everything; Attack Type; Source Point; Required Knowledge; Inherent Limitations; Imposed Limitations; Multi-Phased Attacks; Teaming and Attack Structure; The Security Consultant; The Tester; Logistics; Technical Preparation; Managing of the Engagement; Scenario; ; RECONNAISSANCE; The Hacker; Reconnaissance Techniques; ; ENUMERATION; Technical Objective; Soft Objective; Scope of Effort; Looking Around or Attack?; Preparing for the Next Phase; ; VULNERABILITY ANALYSIS; Weighing the Vulnerability; Source Points; Reporting Dilemma; ; EXPLOITATION; Intuitive Testing; Evasion; War Dialing; Threads and Groups; Operating Systems; Password Crackers; Rootkits; Applications; Network; Services and Areas of Concern; ; FINAL ANALYSIS; Critical; Warning; Informational; ; DELIVERABLE; Overall Structure; Aligning Findings; Format; ; INTEGRATION;INTRODUCTION; Perspectives of Value; ; SECURITY AND HACKING; Information Security; Security Architecture; Hacking Impacts; ; THE FRAMEWORK; Business Planning and Operations; Reconnaissance; Enumeration; Vulnerability Analysis; Exploitation; Final Analysis; Deliverable; Integration; ; INFORMATION SECURITY PROGRAM; Scope of Information Security Programs; The Process of Information Security; Component Parts of Information Security Programs; ; BUSINESS PLANNING AND OPERATIONS; Business Objectives; Security Policy; Previous Test Results; Business Challenges; The Business of Security; Reasoning; Overall Expectations; How Deep is Deep Enough?; Timing is Everything; Attack Type; Source Point; Required Knowledge; Inherent Limitations; Imposed Limitations; Multi-Phased Attacks; Teaming and Attack Structure; The Security Consultant; The Tester; Logistics; Technical Preparation; Managing of the Engagement; Scenario; ; RECONNAISSANCE; The Hacker; Reconnaissance Techniques; ; ENUMERATION; Technical Objective; Soft Objective; Scope of Effort; Looking Around or Attack?; Preparing for the Next Phase; ; VULNERABILITY ANALYSIS; Weighing the Vulnerability; Source Points; Reporting Dilemma; ; EXPLOITATION; Intuitive Testing; Evasion; War Dialing; Threads and Groups; Operating Systems; Password Crackers; Rootkits; Applications; Network; Services and Areas of Concern; ; FINAL ANALYSIS; Critical; Warning; Informational; ; DELIVERABLE; Overall Structure; Aligning Findings; Format; ; INTEGRATION; Mitigation; Defense Planning; Incident Management; Security Policy; ; CONCLUSION; ; APPENDIX-SPOOFING AND SEQUENCE ATTACK … (more)
- Publisher Details:
- Boca Raton, FL : Auerbach Publications
- Publication Date:
- 2005
- Extent:
- 1 online resource (322 pages), illustrations
- Subjects:
- 005.8
Computer networks -- Security measures
Computer networks -- Testing
Hackers
Business enterprises -- Computer networks
COMPUTERS -- Internet -- Security
COMPUTERS -- Networking -- Security
COMPUTERS -- Security -- General
Business enterprises -- Computer networks
Hackers
Computer networks -- Security measures
Computer networks -- Testing
Electronic books - Languages:
- English
- ISBNs:
- 0203495411
9780203495414
9780849316098 - Related ISBNs:
- 084931609X
- Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.163546
- Ingest File:
- 01_114.xml