Student: Carrera, Adolfo D.
Professor: Weidman, Elizabeth
CIS 106 (Introduction to Information Technology)
5/17/15
Hacking of random access memory (RAM) is a very basic idea. Hacking itself is defined as using a computer to gain unauthorized access to data within a system. Another way of defining hacking is the crashing a computer system. Following below is some information of how hacking RAM is useful as well as commonly used programs used by so-called ethical hackers.
One such program is called metasploit. This program is used by cyber security personnel to help advise clients of possible vulnerabilities against their own systems. Metaslpoit is owned by Rapid7, who provides security data and analytic …show more content…
software. There are now certifications being offered by Rapid7 for the metatsploit program (Rapid7 2014). This enables ethical hackers to provide a sense of proven accomplishment to companies that seek to employ vulnerability testing of their networking systems. Rapid7 also has another program that goes hand in hand with metasploit, that program is called Nexpose Administrator. Rapid7 has also created a certification for Nexpose as well. These programs allow companies to proactively scan for any vulnerability. The certifications allow hiring managers to make sure of the ability of employees to operate Rapid7’s security solutions. Hacking has become a part of today’s online and networked world. There being a constant good guy versus bad guy going on every day.
Another program used by ethical hackers and hackers alike is nmap.
Nmap now in version 4.0 is an open source scanner. It test can test your firewall and network applications whether hidden or not. Nmap also tests the intrusion detection system (IDS). Nmap is fairly easy to use and a simple scan just scratches the surface of the capabilities the program can do for you in a network vulnerability scan. There is also a website dedicated to the commands you can enter into nmap and usage scenarios that you may encounter. At the very core, nmap uses a system of 11 scan techniques, all with different customizations (Fellinge 2006). The newer version of nmap allows users now to run the make certain changes to the program without having to restart the application, this new feature sets a milestone in the online hacking …show more content…
community.
The best way to keep from being hacked is quite simple.
Just never log on to your computer and never connect it to the internet. So while simple yes, you cannot do that as it would defeat the purpose of owning a PC or having a company with many of them. There are free programs out there that may help from your computer from being hacked. One program is the Microsoft baseline security analyzer (MBSA). Another program is Sysinternals, there are also some security programs build into the windows OS which are NetBIOS and TCP/UDP. A good practice to prevent hacking is to have multiple security programs working hand in hand with each other. Which in turn may make your computer possible harder to crack into and thus making a hacker possibly turn his attention elsewhere. Installing multiple firewalls around vulnerable programs also helps against being a soft target for hackers. Having to crack through or maneuver around them. You have to be continually testing your network and system to ensure that you have no cracks in your armor. Staying vigilante would be another good practice to partake in to help combat your computer being hacked into. You should always want to stay one step ahead of anyone trying to crack your
system.
Hacking has become a part of everyday life for companies and governments alike. There are more and more schools offering graduate programs focusing on computer science and information technology. There are also more certification courses being offered up for individuals to take. There are many hackers out there that are trying to make a name for themselves, and it is generally those hackers that are the most volatile and malicious. Companies now have departments dedicated to ethical hackers so to say. They are employed by the company to continually test all aspects of their infrastructure to combat any weaknesses or vulnerabilities that may arise, or be exploited. With the continual development of new software programs to assist in finding weaknesses in computer systems and computer networks, there will always be a need for good-guy hackers. The good guy versus bad guy has been around for ages and now extends into the 21st century in a new aspect, with the prying of company/ government information and the protection of it.
References
Fellinge, J. (June 2006). Nmap 4.0 Does Windows. Window IT Security. 6(6). Retrieved from http://eds.b.ebscohost.com/eds/detail/detail?sid=22c38025-b9a8-4a0c-a004-217d9c572d13%40sessionmgr114&vid=5&hid=117&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#db=bth&AN=21004397
Rapid7 (April 2014). Rapid7 Announces Professional Security Certifications for Nexpose and Metasploit. Business Wire. Retrieved from http://eds.b.ebscohost.com/eds/detail/detail?vid=2&sid=d09e0515-9b74-4bf2-af0f-e3bef9a3737b%40sessionmgr114&hid=117&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#db=bwh&AN=bizwire.c54624528
Davis, M. A., Bodmer, S. M., LeMasters, A. (2010). Hacking Exposed Malware & Rootkits: Malware & Rootkits Security Secrets & Solutions. Retrieved from http://eds.b.ebscohost.com/eds/detail?sid=617eb582-2ac4-4641-bb85-92d57c4167e6@sessionmgr113&vid=2#db=nlebk&AN=291445
Ahmad, D. R., Russell, R. (2002). Hack Proofing Your Network. Retrieved from http://eds.a.ebscohost.com/eds/detail?sid=dd720a18-79a5-44bb-8a71-49c6e0dcfd33@sessionmgr4004&vid=6#db=nlebk&AN=75905
Beaver, K. (2012). Hacking for Dummies. Retrieved from http://eds.a.ebscohost.com/eds/detail?sid=a0d2b9df-3649-4acb-aa55-79cdce36661a@sessionmgr4004&vid=2#db=nlebk&AN=518579