CEHv6 Module 62 Case Studies

Document Sample
CEHv6 Module 62 Case Studies Powered By Docstoc
					Ethical Hacking and
Countermeasures
Version 6




    Module LXII
    Case Studies
             Hawaii Safeguards Schools Statewide
                 g                       y
             Using Intrusion Protection Systems




                                            Source: http://www.tippingpoint.com

                                                            Copyright © by EC-Council
EC-Council                       All Rights Reserved. Reproduction is Strictly Prohibited
             U.S. Army Project Office Relies on Novell¨
             Solutions for a High Level of Security
                               g                  y




                                                    Source: http://www.novell.com

                                                                 Copyright © by EC-Council
EC-Council                            All Rights Reserved. Reproduction is Strictly Prohibited
             McAfee Gives RPC Comprehensive
             Visibility into its Critical Systems with
             Operational Efficiency




                                                                  Source: http://i.i.com.com/

                                                                   Copyright © by EC-Council
EC-Council                              All Rights Reserved. Reproduction is Strictly Prohibited
             Cumberland Bank Find Solution to
                                y
             Monitor the Security and Performance




                                                Source: http://www.goldleaf.com/

                                                            Copyright © by EC-Council
EC-Council                       All Rights Reserved. Reproduction is Strictly Prohibited
             SurfControl Enterprise Protection Suite Protects
             Thousands at Glenbrook Schools Against Internet
             Dangers




                                              Source: http://www.surfcontrol.com/

                                                                     Copyright © by EC-Council
EC-Council                                All Rights Reserved. Reproduction is Strictly Prohibited
             Arbor Uncovers Worm Infections Inside
                                   g
             One of the World’s Largest Banks




                                            Source: http://www.arbornetworks.com/

                                                             Copyright © by EC-Council
EC-Council                        All Rights Reserved. Reproduction is Strictly Prohibited
             Imperial Chemical Industries PLC -
                     g        y
             Enforcing Security SLAs of Outsourcers




                                                 Source: http://www.qualys.com/

                                                              Copyright © by EC-Council
EC-Council                         All Rights Reserved. Reproduction is Strictly Prohibited
             Penetration Testing: Case Study




                                               Source: http://www.procheckup.com/
                                                           Copyright © by EC-Council
EC-Council                      All Rights Reserved. Reproduction is Strictly Prohibited
             Security Penetration Testing




                                                          Source: http://wipro.com/

                                                           Copyright © by EC-Council
EC-Council                      All Rights Reserved. Reproduction is Strictly Prohibited
             Hacking Case Study




                                                 Source: http://www.cy4or.co.uk/

                                                         Copyright © by EC-Council
EC-Council                    All Rights Reserved. Reproduction is Strictly Prohibited
             Evil Jimmy the Hacker as He Scans a
             Small Company Called Little Company
             Network (LCN)
             N t     k




                                                  Source: http://www.ciscopress.com/

                                                             Copyright © by EC-Council
EC-Council                        All Rights Reserved. Reproduction is Strictly Prohibited
             PwC Integrates AppScan into Threat and
             Vulnerability Practice Enabling Rapid
             Application Security




                                       Source: http://www.watchfire.com/

                                                               Copyright © by EC-Council
EC-Council                          All Rights Reserved. Reproduction is Strictly Prohibited
             Case Study for RSS




                                                    Source: http://www.encription.co.uk/

                                                             Copyright © by EC-Council
EC-Council                        All Rights Reserved. Reproduction is Strictly Prohibited
             IT Consulting Firm Improves E-Mail
             Filtering, Increases Productivity With New
             Solution




                                          Source: http://download.microsoft.com/

                                                                 Copyright © by EC-Council
EC-Council                            All Rights Reserved. Reproduction is Strictly Prohibited
             Postbank Signs Customer E-mails With
             Team Certificates From TC TrustCenter, To
             Protect its Customers Against Phishing




                                                       Source: http://www.trustcenter.de/

                                                                Copyright © by EC-Council
EC-Council                           All Rights Reserved. Reproduction is Strictly Prohibited
             University Limits Spam, Reduces IT
                     t      a     te g Service
             Costs With E-Mail Filtering Se ce




                                        Source: http://download.microsoft.com/

                                                             Copyright © by EC-Council
EC-Council                        All Rights Reserved. Reproduction is Strictly Prohibited
             Hooking “Phishing” Emails Before They Reach
             Customers with Online Fraud Management Service




                                              Source: http://eval.veritas.com/

                                                                   Copyright © by EC-Council
EC-Council                              All Rights Reserved. Reproduction is Strictly Prohibited
             Corporate Espionage: Case Study




                                                         Source: http://csrc.nist.gov/

                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
             Making Data Security a Top Priority for
             Leading IT Provider to the Airline Industry




                                                             Source: http://eval.veritas.com/

                                                                 Copyright © by EC-Council
EC-Council                            All Rights Reserved. Reproduction is Strictly Prohibited
             Eliminating Spam In Its Tracks with Multi-
             Layered Solutions from Symantec




                                                 Source: http://eval.veritas.com/mktginfo/

                                                                Copyright © by EC-Council
EC-Council                           All Rights Reserved. Reproduction is Strictly Prohibited
             Captus Networks Helps Prevent Denial of
             Service Attacks with Intel® Network
                          Multi-gigabit Scalability
             Adapters for Multi gigabit Scalabilit




                                                  Source: http://www.intel.com/network/

                                                               Copyright © by EC-Council
EC-Council                          All Rights Reserved. Reproduction is Strictly Prohibited
             Bellingham+Stanley Implement
             Integrated Solution For Web And Email
             Security
             Securit




                                                  Source: http://www.insight.co.uk/files/

                                                               Copyright © by EC-Council
EC-Council                          All Rights Reserved. Reproduction is Strictly Prohibited
             Australian Company Implements World’s
             Largest Biometric Voice ID System
                g                        y




                                              Source: http://www.searchsecurity.com.au/

                                                              Copyright © by EC-Council
EC-Council                         All Rights Reserved. Reproduction is Strictly Prohibited
Summary

   This module has drawn various cases of information
   theft and security around the world

   It draws a picture of various practical applications that
   many companies have adopted to enhance security of
   their assets




                                                                     Copyright © by EC-Council
EC-Council                                All Rights Reserved. Reproduction is Strictly Prohibited

				
pham tien huong pham tien huong
About