• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 04: Network Mapping and Vulnerability Scanning

Article 4: Motorola, Known For Cellphones, is Fast Becoming a Major Player in Government Surveillance

October 3, 2019 by Imran Jordan Kharabsheh Leave a Comment

Now having invested over $1.7 billion dollars in acquisitions since 2017, tech giant Motorola Solutions has acquired a large chunk of the surveillance market, who the primary buyer is the government, under a single roof. Among the technologies they have acquired and been developing include police body cameras, smart train cameras that can identify faces and distinguish suspicious behavior, and smart camera networks that can track car movements by their license plates. What many civil liberties groups find frightful about this information is that Motorola may be selling most of their developed and acquired surveillance technology as a single product or as packages, arguing that your privacy is safer when “information about you is scattered among agencies and entities”. I looked personally to see if Motorola Solutions had issued a response or a statement regarding their recent acquisitions of surveillance tech companies, however I could not seem to find anything regarding the matter.

Source: https://yro.slashdot.org/story/19/10/02/2134249/motorola-known-for-cellphones-is-fast-becoming-a-major-player-in-government-surveillance

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

A cyber security chief’s 8 tips on how to protect yourself online as data breaches continue

September 29, 2019 by Percy Jacob Rwandarugali Leave a Comment

Encryption is viewed by many as “bulletproof” technology to protect data from cyber thieves. Organizations swear by it, and consumers feel overly confident knowing that their recent transactions and personal data are encrypted. Despite the confidence around this “go to” technology, time has shown that encryption is just not enough. In fact, it’s failing us.

High-profile data breaches, including Thursday’s DoorDash breach, continue. While the details of the Doordash incident — which included the last four digits of payment cards for some consumers, as well as names, emails, delivery addresses and phone numbers — require further analysis, other recent corporate hacks shows us that encryption either did absolutely nothing to prevent hackers from infiltrating systems or, worse, helped disguise cybercriminals while wreaking havoc in organizations’ systems.

https://www.cnbc.com/2019/09/27/cybersecurity-chiefs-8-tips-to-protect-yourself-online.html

Filed Under: Uncategorized, Week 04: Network Mapping and Vulnerability Scanning Tagged With:

Presentation and Video for Week 4

September 20, 2019 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-4

https://capture.fox.temple.edu/Mediasite/Play/9dc73cb1d44444bbb8d347eef70b103c1d

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

The Windows 10 security guide: How to safeguard your business

September 14, 2019 by Penghui Ai Leave a Comment

This article interprets some approaches to make your Windows 10 more secure. For a big company, they should have an IT security specialist to manage their system. For a small company, it is better to outsource the responsibilities to the third party. Also, it provides some suggestions for all businesses.
MANAGING UPDATES
The absolute most significant security setting for any Windows 10 PC is guaranteeing that updates are being introduced on a normal, unsurprising timetable. That is valid for each advanced processing gadget, obviously, yet the “Windows as an administration” model that Microsoft presented with Windows 10 changes how you oversee refreshes.
IDENTITY AND USER ACCOUNT MANAGEMENT
Each window 10 PC requires at any rate one user account, which is thus ensured by a secret password and optional validation components. How you set up that account goes far toward guaranteeing the security of the device. Physical security is significant as issues identified with software or networks. For a business or a government agency, the effect can be shocking, and the results are surprisingly more terrible in controlled enterprises or where information break laws require open revelation. On a Windows 10 device, the absolute most significant setup changes you can make is to enable BitLocker device encryption.
BLOCKING MALICIOUS CODE
As the world has turned out to be increasingly associated and online aggressors have turned out to be progressively complex, the job of conventional antivirus software has changed. Rather than being the essential device for hindering the establishment of malicious code, security software is currently simply one more layer in a guarded methodology. Each establishment of Windows 10 incorporates built-in antivirus, anti-malware software called Windows Defender, which updates itself utilizing a similar instrument as Windows Update. Windows Defender is intended to be a set-it-and-forget-it feature and doesn’t require any manual design. If you install an outside security bundle, Windows Defender moves to one side and enables that product to distinguish and evacuate potential dangers. Large organizations that utilization Windows Enterprise edition can send Windows Defender Advanced Threat Protection, a security platform that monitors endpoints, for example, Windows 10 PCs using behavioral sensors. Using cloud-based investigation, Windows Defender ATP can identify suspicious behavior and alert administrators to potential dangers.
NETWORKING
Each version of Windows in the previous 15 years has incorporated a stateful investigation firewall. In Windows 10, this firewall is empowered by default and need not bother with any tweaking to be effective. Similarly, as with its predecessors, the Windows 10 firewall supports three distinctive network configurations: Domain, Private, and Public. Applications that need access to arrange assets can by and large design themselves as a part of starting arrangement.
To modify fundamental Windows firewall settings, utilize the Firewall and Network Protection tab in the Windows Security application. For an increasingly exhaustive, expert-only arrangement of setup tools, click Advanced Settings to open the legacy Windows Defender Firewall with Advanced Security console. On managed networks, these settings can be controlled through a combination of Group Policy and server-side settings.

https://www.zdnet.com/article/the-windows-10-security-guide-how-to-safeguard-your-business/

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in