25
Ethical Hacking and Countermeasures Countermeasures Version 6 Module LXII Module LXII Case Studies

Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Ethical Hacking and CountermeasuresCountermeasuresVersion 6

Module LXIIModule LXII

Case Studies

Page 2: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Hawaii Safeguards Schools Statewide Using Intrusion Protection Systemsg y

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.tippingpoint.com

Page 3: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

U.S. Army Project Office Relies on Novell¨Solutions for a High Level of Securityg y

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.novell.com

Page 4: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

McAfee Gives RPC Comprehensive Visibility into its Critical Systems with Operational EfficiencyOperational Efficiency

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://i.i.com.com/

Page 5: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Cumberland Bank Find Solution to Monitor the Security and Performancey

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.goldleaf.com/

Page 6: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

SurfControl Enterprise Protection Suite Protects Thousands at Glenbrook Schools Against Internet DangersDangers

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.surfcontrol.com/

Page 7: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Arbor Uncovers Worm Infections Inside One of the World’s Largest Banksg

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.arbornetworks.com/

Page 8: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Imperial Chemical Industries PLC -Enforcing Security SLAs of Outsourcersg y

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.qualys.com/

Page 9: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Penetration Testing: Case Study

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.procheckup.com/

Page 10: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Security Penetration Testing

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://wipro.com/

Page 11: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Hacking Case Study

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.cy4or.co.uk/

Page 12: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Evil Jimmy the Hacker as He Scans a Small Company Called Little Company N t k (LCN)Network (LCN)

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.ciscopress.com/

Page 13: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

PwC Integrates AppScan into Threat and Vulnerability Practice Enabling Rapid Application SecurityApplication Security

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.watchfire.com/

Page 14: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Case Study for RSS

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.encription.co.uk/

Page 15: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

IT Consulting Firm Improves E-Mail Filtering, Increases Productivity With New SolutionSolution

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://download.microsoft.com/

Page 16: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Postbank Signs Customer E-mails With Team Certificates From TC TrustCenter, To Protect its Customers Against PhishingProtect its Customers Against Phishing

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.trustcenter.de/

Page 17: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

University Limits Spam, Reduces IT Costs With E-Mail Filtering ServiceCosts t a te g Se ce

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://download.microsoft.com/

Page 18: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Hooking “Phishing” Emails Before They Reach Customers with Online Fraud Management Service

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://eval.veritas.com/

Page 19: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Corporate Espionage: Case Study

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://csrc.nist.gov/

Page 20: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Making Data Security a Top Priority for Leading IT Provider to the Airline Industry

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://eval.veritas.com/

Page 21: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Eliminating Spam In Its Tracks with Multi-Layered Solutions from Symantec

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://eval.veritas.com/mktginfo/

Page 22: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Captus Networks Helps Prevent Denial of Service Attacks with Intel® Network Adapters for Multi gigabit ScalabilitAdapters for Multi-gigabit Scalability

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.intel.com/network/

Page 23: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Bellingham+Stanley Implement Integrated Solution For Web And Email SecuritSecurity

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.insight.co.uk/files/

Page 24: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

Australian Company Implements World’s Largest Biometric Voice ID Systemg y

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.searchsecurity.com.au/

Page 25: Ethical Hacking and Countermeasures · Title: Microsoft PowerPoint - CEHv6 Module 62 Case Studies.ppt [Compatibility Mode] Author: Administrator Created Date: 7/14/2008 7:03:30 PM

SummarySummary

This module has drawn various cases of information theft and security around the world

It draws a picture of various practical applications that many companies have adopted to enhance security of many companies have adopted to enhance security of their assets

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited