preview

cyber security vulnerabilities

Best Essays

Cybersecurity Vulnerabilities Facing IT Managers Today

Darin Swan
University of Maryland University College
Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our …show more content…

Stuart McClure, Joel Scambray and George Kurtz have provided both strategy and tactics for implementing Mateti’s notable exploitations, amongst many others, in their seminal work Hacking Exposed, now in its sixth edition. It is where hardware, software, and the human element meet within a system that hackers try to take control and security specialists patch vulnerabilities to deny unauthorized access and the cycle appears to be never-ending.
Sniffing, Fingerprinting & Footprinting
From the tactical viewpoint, within the pages of Hacking Exposed the authors provide recipes for exploiting vulnerabilities, as well as instructions on countering exploitations. With regard to sniffing, the text covers a variety of security weaknesses and recommends several software applications that can be used to find a network’s Achilles heel. Cain and KerbSniff are two tools in particular that can be used for eavesdropping on a network password exchange in the Windows environment (McClure et al., 2009, pp. 169-170). Furthermore, network sniffing can be accomplished by using applications such as tcpdump, Snort, and Wireshark, which allow anyone with the means to view traffic across a network. This can be helpful for trying to debug network problems, but in the wrong hands it can prove to be invaluable in

Get Access