Temple University

Week 5

The reading this week focused on a number of tools and how to use them to footprint a company and their networks to piece together the network typography. This is important not only for a malicious hacker but for the security professionals working to secure the company. By using these techniques you can see what a malicious intruder would see and begin to cover up these tracks of your system. The second reading begins to talk deeper about enumeration and finding information about users and user groups to target a system. These techniques set off more alerts within a company’s detection systems so you should only try them on your own machines.

 

My question for the class would be: Are there ways that you can see using enumeration techniques to find information on an individual rather than a business?

 

In the News:

http://www.zdnet.com/article/hp-bulks-up-security-features-on-enterprise-laserjet-printers/

HP is enhancing security features on their enterprise laserjet printers. An interesting point from the article. “Citing a Ponemon Institute, HP claims that 64 percent of IT managers believe their networked printers are likely infected with malware, while 56 percent of enterprise companies ignore printers in their endpoint security strategy.”

Leave a Reply

Your email address will not be published. Required fields are marked *