Report: Tools, Techniques, and Ethical Hacking for Security

Verified

Added on  2022/08/12

|6
|1447
|18
Report
AI Summary
This report provides a comprehensive analysis of threats, vulnerabilities, and exploits in IT systems. It explores various security tools and techniques, including protocol analyzers, honeypots, and vulnerability scanners, highlighting their roles in detecting system vulnerabilities. The report discusses the practice of offering rewards for discovering vulnerabilities (VRP) and the risks associated with challenging individuals to exploit system vulnerabilities. It also emphasizes the importance of ethical hackers in identifying and mitigating security risks, and the role they play in protecting systems from malicious attacks. The report concludes by underscoring the necessity of ethical hackers in safeguarding systems and the significance of understanding and addressing the ever-evolving landscape of cyber threats.
Document Page
Running head: THREAT, VULNERABILITY, AND EXPLOITS
THREAT, VULNERABILITY, AND EXPLOITS
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1THREAT, VULNERABILITY, AND EXPLOITS
Tools and techniques to determine security vulnerabilities and threats:-
Some tools can be protecting any business computer system. Some familiar tools like
protocol analyzer, honeypots, and vulnerabilities scanner are helpful to detect any system
vulnerabilities.
Protocol Analyzer:-
It is the tool that can be applying for both software and hardware. It can deliver specific
means of communication over the standard communication protocol. Every one of these
categories of the protocols has specific several tools that can be used for the data and signal
collection.
Honeypots:-
The system has several usages for the word honey pot. It is mainly some deception that
has been usual for deflecting or detecting individual attempts that are completing in order to get
admittance to the operating system and the illegal usage of the information structure. It looks to
cover some evidence and the resources of significance to the cyber attackers (Jang-Jaccard &
Nepal, 2014). This mechanism is much more comparable to the attracting, which is set by the
laws for a particular cyber-criminal. Then that bait is showed through the specific investigation,
which is below cover.
Vulnerability Scanners:-
Vulnerability Scanners are always significant to one to check out with the protective
procedures of the processer and check whether they are satisfactory or not (Cohen-Almagor,
2018). The scanning software can be applying for checking out whether the sequencer is planned
Document Page
2THREAT, VULNERABILITY, AND EXPLOITS
to outbreak the processor or not. Authentic and unauthentic scans are the two types of
vulnerabilities scanner.
Authenticated scans permit the vulnerability scanner to low-level entrance data, like
specific services and configuration facts of the host functioning system. On the other side, the
unauthenticated system is used by risk actors or safety analysts trying to regulate the security
position of visibly accessible properties.
The practice of offering rewards for discovering vulnerabilities:-
Due to growing cyber-attack and major hacking events, the significance of locating the
susceptibilities is growing, which is continuously striving creators and businesses to scan and
expand their code of honesty at the primary stage. Software susceptibilities mainly exist because
the computer operator is under pressure to execute code rapidly for fresh products at the outflow
of protected SDL processes (Rathore, 2015). The detection of security concerns that disturb
software executions from several vendors or a vendor with leading market share, like weaknesses
in IP, will also be rewarded.
VRP offering satisfactory motivations entices safety re-searchers to look for
susceptibilities, and this enhanced attention expands the possibility of discovering latent
weaknesses (Park, Na & Kim, 2014). The implementation of VRP can update the security
strategy and that any outside support is retained small. As if the external communication is small,
it will aid the business to limit the threat.
The risks of challenging individuals to exploit vulnerabilities in the system:-
There is a threat included with challenging individuals to accomplish the business's
network. The business wants to confirm that the persons they are using are trustworthy that it is
Document Page
3THREAT, VULNERABILITY, AND EXPLOITS
they go out to a business to analyze their network. Administrations have to concentration their
determinations on the concerns that cause the supreme risk. A system weakness is a weak spot in
the organization network that should be exploited by a safety threat. System hazards are the
probable concerns and influences of unaddressed weaknesses (Baloch, 2017). Some of the
threats linked with that weakness contain data loss, days or hours of site interruption, and the
staff time desired to reconstruct a server after it has co-operated.
The difficulties lie in the circumstance that many safety teams recklessly receive the risk
ratings allocated to susceptibility valuation tools and penetration examination reports. They are
ready to deliver a list of all exposed vulnerabilities (Abomhara, 2015). However, they frequently
cannot deliver an explanation for those ratings and consequently cannot give corporate decision-
makers the industry contact information they want to make an accurate decision. Recognizing
system susceptibilities and exploits within a specialized penetration investigation project is
frequently not enough. Business customers wish to know the impact susceptibilities have in their
network setting, not just their survival.
Just as technical expertise and software modification and improvement in no time at all,
so too do cyberbully. Malware, viruses, and spasms get much sophisticated. The cybercriminals
identify and also exploit the weaknesses in outmoded software. When the business organization
has nonoperational software, this specific organization is not missing out on insufficient new
structures or a marginally faster program. The authority of an organization is also revealing its
business to susceptibilities and safety risks.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4THREAT, VULNERABILITY, AND EXPLOITS
Formation of ethical hackers:-
An ethical hacker is an expert in IT security who scientifically efforts to penetrate a
network, processor system, application, or another computing source. The purpose of ethical
hacking is to estimate the safety of and recognize susceptibilities in systems, system
infrastructure, or networks. It contains attempting and finding to exploit any susceptibilities to
regulate whether unlawful access or other mischievous actions are possible. Ethical hackers
usually find safety exposures in insecure system outlines, identified and unidentified software or
hardware vulnerabilities, as well as functioning weaknesses in process or methodological
countermeasures.
As per the report writer's opinion on ethical hackers, initially, everybody needs to
understand a hacker is a hacker. The persons have classified them into three classifications like
black, white, and grey as the colors signify the phases of how corrupt or decent every hacker is
— white and black, defines as good and bad hackers, respectively. The writer would have to
define there are attackers out there the hack into processor structure for moral reasons. They get
compensated enough for this work for any business. The report writer also believes that the
ethical hacker is necessary for every business organization. The ethical hackers attempt to bypass
the computer and network structure.
For this reason, they quickly penetrates any weak points that could be exploited by
hateful cyber attackers. This data is then used by the business to recover the system safety, to
minimize or remove any possible attacks (El Asam & Samara, 2016). Ethical hackers are also
involved in social manufacturing ideas. They can penetrate any system structure over trash bins
for charts, passwords, and something with vital evidence that can be used to produce an attack.
Document Page
5THREAT, VULNERABILITY, AND EXPLOITS
So, according to this report, the writer's ethical hacker is essential for protecting any system
servers form unethical hackers.
References:-
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Baloch, R. (2017). Ethical hacking and penetration testing guide. Auerbach Publications.
Cohen-Almagor, R. (2018). Social responsibility on the Internet: Addressing the challenge of
cyberbullying. Aggression and violent behavior, 39, 42-52.
El Asam, A., & Samara, M. (2016). Cyberbullying and the law: A review of psychological and
legal challenges. Computers in Human Behavior, 65, 127-141.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of
Computer and System Sciences, 80(5), 973-993.
Park, S., Na, E. Y., & Kim, E. M. (2014). The relationship between online activities, netiquette
and cyberbullying. Children and youth services review, 42, 74-81.
Rathore, N. (2015). Ethical hacking and security against cyber crime. i-manager's Journal on
Information Technology, 5(1), 7.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]