[Year 12 SofDev] Security of data and networks

Kent Beveridge kbeveridge at stbc.vic.edu.au
Wed Jul 4 20:09:43 EST 2012


I have a former student now working with IBM in this area who has offered to present to my current students on this topic and with some 'proprietory' industry tools of the trade.

Kent Beveridge
ICT Coordinator & Maths teacher

On 04/07/2012, at 11:14 AM, "Kevork Krozian" <kevork at edulists.com.au<mailto:kevork at edulists.com.au>> wrote:

Hi folks,

I am working on a few network security activities at the moment. I have
come across a number of tools that are designed for network, wireless and
server security testing, probing and checking. These are relevant to a
number of KKs such as:

Outcome 42
KK5 - criteria and techniques for testing the security of networked
environments

Outcome 41
 KK19 - security measures designed to protect the integrity and security
of data and information.

Outcome 31
 KK8 - the functions, technical underpinnings and sources of worms,
Trojans and spyware that intentionally threaten the security of networks

  The tools include the following:
1. Superscan - detects open (layer 4 of the OSI) TCP and UDP ports on a
target host
2. Microsoft Baseline Security Scanner MBSA - carries out security health
check on Windows clients and servers with fixes.
3. Password crackers , sniffers, protocol inspectors, vulnerability
scanners , Exploits, Man in the Middle attack simulator ( Ettercap ),
wireless crackers etc  - http://sectools.org/

 In fact http://sectools.org/  is quite amazing in analyzing the top 125
security tools each year. Wireshark the protocol analyzer tool is in
first place. It is free and quite remarkable in the way it peels back
the contents of each layer
Aircrack-ng is the number 1 wireless security auditing software able to
crack 802.11 (only a,b,g ) WEP and WPA-PSK keys once enough packets have
been scanned.

 There is also intruder detection (IDS) and intruder prevention
(IPS)software that detects an attempt to scan a router's ports and
vunlerabilities. An example of this is with Cisco routers that have IDS
and IPS capabilities.

Also keep in mind attacks do not only happen from external sources,
therefore internally,  networks have to be protected as well. Internal
attacks can be from a variety of sources including introduction of
devices, files, open wireless access points, rogue employees etc.

Feel free to use or discard.

Take Care
Kevork



_______________________________________________
http://www.edulists.com.au - FAQ, Subscribe, Unsubscribe
IT Software Development Mailing List kindly supported by
http://www.vcaa.vic.edu.au - Victorian Curriculum and Assessment Authority and
http://www.vcaa.vic.edu.au/vce/studies/infotech/softwaredevel3-4.html
http://www.vitta.org.au  - VITTA Victorian Information Technology Teachers Association Inc
http://www.swinburne.edu.au/ict/schools - Swinburne University
St. Brigid's College
97 Robinson Street, Horsham VIC 3400
T 03 5382 3545   F 03 5382 0757
ABN 72 749 438 155
www.stbc.vic.edu.au<http://www.stbc.vic.edu.au/>
        [http://library.stbc.vic.edu.au/StBCLogo.jpg]
P Please consider the environment before printing this email or attachment.
IMPORTANT! This email and any attachments may be confidential. If received in error, please contact us and delete all copies. St. Brigid's College does not represent or warrant that the attached files are free from computer viruses or other defects. The attached files are provided, and may only be used, on the basis that the user assumes all responsibility for any loss, damage or consequence resulting directly or indirectly from the use of the attached files, whether caused by the negligence of the sender or not. The liability of St. Brigid's College is limited in any event to either the resupply of the attached files or the cost of having the attached files resupplied. Any representations or opinions expressed in this email are those of the individual sender, and not necessarily those of St. Brigid's College.


This message has been scanned for malware by Websense. www.websense.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/sofdev/attachments/20120704/4a994b82/attachment.html 


More information about the sofdev mailing list