1 introduction and definitions. 2 purpose of the course this course is designed to provide students...
TRANSCRIPT
![Page 1: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/1.jpg)
1
Introduction and Definitions
![Page 2: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/2.jpg)
2
Purpose of the Course
This course is designed to provide students with hands on experience on identifying places where the security of their networks can be improved.
– The techniques used to evaluate the network will vary.
– Programming will not be required for the course
![Page 3: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/3.jpg)
3
Texts
• Resources on Course Syllabus• Know Your Enemy, Second Edition
Honeynet Project (Enemy)• The Art of War, Sun Tzu (Griffith
Translation), or use text from Internet: http://classics.mit.edu/Tzu/artwar.1b.txt (Sun)
![Page 4: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/4.jpg)
4
Grading
• 15% (each) four graded homeworks• 40% Final Paper
(Topic related to course content,Submit paragraph-length proposal ASAP)
• Joint work to understand allowed• Work for submission is to be individual
unless otherwise specified or approved
![Page 5: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/5.jpg)
Homework and Warnings
• No Plagiarism• Virtual Machines• No hacking outside of VMs• Legal Penalties• Authorization
5
![Page 6: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/6.jpg)
6
Why Defensive Hacking?
• Hackers won’t play fair• Demonstrating vulnerability• Prioritizing remediation
![Page 7: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/7.jpg)
Tactical and Strategic
• Tactical: Working to hack specifically identified hosts and services to improve security
• Strategic: Working to improve network operations to support mission in face of persistent and resourced attacks
7
![Page 8: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/8.jpg)
8
Information Warfare
“Information warfare is the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military or business adversaries.”
Dr. Ivan Goldberg
![Page 9: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/9.jpg)
Related Terms
• Penetration Testing• Network Security Testing• Tiger Teaming• Live Fire Exercise
9
![Page 10: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/10.jpg)
Some Important Caveats
• Authorization• Managerial backing• Goals• Organization• Results distribution
10
![Page 11: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/11.jpg)
Ethics• First, Do No Harm• Accountability• Handling Information• Handling Vulnerabilities• Insider Threat• Discovering Attacks• Educating Attackers• We Think We Are Really Secure
11
![Page 12: 1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where](https://reader036.vdocument.in/reader036/viewer/2022072006/56649f475503460f94c69208/html5/thumbnails/12.jpg)
Course Overview
• Introduction• Tactical Process• Probing Services• Strategy• Teams• Strategic Process
12