An Examination of Penetration Testing (Ethical Hacking) and Delivering
Jones, David Andrew
Cardiff Metropolitan University
MetadataShow full item record
The overall aim of this research is to examine penetration testing and deliver the proposed tests to Clee Tompkinson Francis, to investigate the impact on a small business network’. The continual advancement in technology has created the need for all businesses to implement cyber security methods to protect their sensitive data, which is becoming increasingly difficult due to the array of cyber attacks available to anyone with a Internet connected device. As the evolution of computing continues, the use of a business network to connect with customers is becoming normality. However, it is imperative that this data is securely stored. Research suggests that penetration testing (ethical hacking) can be utilised to locate the vulnerabilities within a network, preventing the loss of any confidential data. Nevertheless, it can be seen as a costly procedure, with many small businesses being unable to afford it as a cyber security resource. By working meticulously with Clee Tompkinson Francis, this investigation was constructed to determine if open source (free) penetration testing software could be used to perform a network services test to discover the vulnerabilities and resolve them, before they were exploited by an unauthorised user. In addition, the data was obtained by using four open source tools, including Nmap, Google Hacking, Nessus and Brutus. The use of this software obtained multiple Microsoft Access database files containing client sensitive data and contributed to the discovery and resolution of two hundred and twenty three network vulnerabilities for Clee Tompkinson Francis. Ultimately, a conclusion was derived from this project, which suggests that penetration testing (ethical hacking) is an admirable method for any business trying to protect their network but it can also be conducted by a smaller business with open source software, when limited cyber security resources are available.
BSc Hons Computing
Showing items related by title, author, subject and abstract.
To critically evaluate the marketing strategy and promotional techniques implemented by Camp America. Jordan, Sophie (Cardiff Metropolitan University, 2012)In times where competition within the youth travel market is extremely dense, consumer power is increasing; therefore companies now need to create new innovative ideas within their marketing strategy in order to penetrate ...
Innovation-Led Entrepreneurship and Inter-Organizational Knowledge Flow: The Formation of Network Capital Huggins, Robert; Clifton, Nick (Triple Helix Association, 2013-07)Firms utilise inter-organizational networks to manage flows and access knowledge to enhance expected economic returns. In particular, inter-organizational networks are an important aspect of the innovation process. The aim ...
Batting head injury in professional cricket: a systematic video analysis of helmet safety characteristics Ranson, Craig; Peirce, Nicholas; Young, Mark (BMJ Publishing Group, 2013)Background Batters in cricket are continuing to sustain head and facial injuries despite wearing protective helmets. Objective To gain an understanding of the types and mechanisms of head injuries sustained by batters ...