An Examination of Penetration Testing (Ethical Hacking) and Delivering
Jones, David Andrew
Cardiff Metropolitan University
MetadataShow full item record
The overall aim of this research is to examine penetration testing and deliver the proposed tests to Clee Tompkinson Francis, to investigate the impact on a small business network’. The continual advancement in technology has created the need for all businesses to implement cyber security methods to protect their sensitive data, which is becoming increasingly difficult due to the array of cyber attacks available to anyone with a Internet connected device. As the evolution of computing continues, the use of a business network to connect with customers is becoming normality. However, it is imperative that this data is securely stored. Research suggests that penetration testing (ethical hacking) can be utilised to locate the vulnerabilities within a network, preventing the loss of any confidential data. Nevertheless, it can be seen as a costly procedure, with many small businesses being unable to afford it as a cyber security resource. By working meticulously with Clee Tompkinson Francis, this investigation was constructed to determine if open source (free) penetration testing software could be used to perform a network services test to discover the vulnerabilities and resolve them, before they were exploited by an unauthorised user. In addition, the data was obtained by using four open source tools, including Nmap, Google Hacking, Nessus and Brutus. The use of this software obtained multiple Microsoft Access database files containing client sensitive data and contributed to the discovery and resolution of two hundred and twenty three network vulnerabilities for Clee Tompkinson Francis. Ultimately, a conclusion was derived from this project, which suggests that penetration testing (ethical hacking) is an admirable method for any business trying to protect their network but it can also be conducted by a smaller business with open source software, when limited cyber security resources are available.
BSc Hons Computing
Showing items related by title, author, subject and abstract.
To critically evaluate the marketing strategy and promotional techniques implemented by Camp America. Jordan, Sophie (Cardiff Metropolitan University, 2012)In times where competition within the youth travel market is extremely dense, consumer power is increasing; therefore companies now need to create new innovative ideas within their marketing strategy in order to penetrate ...
Berger, Hilary; Jones, Andrew (ACM Digital Library, 2016-07-25)Literature posits that 30,000 SME websites are hacked daily. Thus it is acknowledged that web-based tools are essential to prevent cyber criminals hacking into online networks to comprise their services and gain access to ...
Opposition interaction in creating penetration during match play in elite soccer: evidence from UEFA champions league matches Tenga, Albin; Mortensholm, A.; O'Donoghue, Peter (Taylor and Francis, 2017-11-06)The aim of this study is to compare how penetrations were created between the Finalists and Non-finalists by assessing opposition interaction in elite soccer. Sample included data from 12 matches played from the round of ...