The uniform procedures of penetration test and protection strategies

碩士 === 開南大學 === 資訊學院碩士班 === 106 === Nowadays, Internet is especially important. While we are in information society, hackers are prevalent threats that may cause massive damage/loss. Although not all hackers are malicious, some of them have done offensive attacks. For example, ATM was stolen more th...

Full description

Bibliographic Details
Main Authors: HUANG, ZHI-KAI, 黃志凱
Other Authors: HSU, JUNG-LUNG
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/g56bck
id ndltd-TW-106KNU00392003
record_format oai_dc
spelling ndltd-TW-106KNU003920032019-05-16T00:22:59Z http://ndltd.ncl.edu.tw/handle/g56bck The uniform procedures of penetration test and protection strategies 一致性滲透測試程序與防護策略 HUANG, ZHI-KAI 黃志凱 碩士 開南大學 資訊學院碩士班 106 Nowadays, Internet is especially important. While we are in information society, hackers are prevalent threats that may cause massive damage/loss. Although not all hackers are malicious, some of them have done offensive attacks. For example, ATM was stolen more than NT $ 80 million by hackers, resulting in the loss of money in Taiwan’s First Bank in July 2016 year. IT managers led to everchanging pattern difficult to prepare, but also allow more victims leakage of personal information, we need to think of a solution to the so-called "Know thyself, know yourself", first clearly know each other means, in order to come up with corresponding manner. Hacking attacks are divided into five steps: Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering tracks. The research mainly uses Kali Linux system to implement five major steps of the hacker program. This study would help IT managers, engineers understand hacking procedures, and thus help them propose corresponding methods of protection. In Kali Linux system itself has more than six hundred kinds of penetration tools, hackers program in accordance with the classification of the five steps to achieve tool, users will not have to reduce from six hundred kinds of penetration tool to screen to be used. HSU, JUNG-LUNG 許榮隆 2018 學位論文 ; thesis 60 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 開南大學 === 資訊學院碩士班 === 106 === Nowadays, Internet is especially important. While we are in information society, hackers are prevalent threats that may cause massive damage/loss. Although not all hackers are malicious, some of them have done offensive attacks. For example, ATM was stolen more than NT $ 80 million by hackers, resulting in the loss of money in Taiwan’s First Bank in July 2016 year. IT managers led to everchanging pattern difficult to prepare, but also allow more victims leakage of personal information, we need to think of a solution to the so-called "Know thyself, know yourself", first clearly know each other means, in order to come up with corresponding manner. Hacking attacks are divided into five steps: Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering tracks. The research mainly uses Kali Linux system to implement five major steps of the hacker program. This study would help IT managers, engineers understand hacking procedures, and thus help them propose corresponding methods of protection. In Kali Linux system itself has more than six hundred kinds of penetration tools, hackers program in accordance with the classification of the five steps to achieve tool, users will not have to reduce from six hundred kinds of penetration tool to screen to be used.
author2 HSU, JUNG-LUNG
author_facet HSU, JUNG-LUNG
HUANG, ZHI-KAI
黃志凱
author HUANG, ZHI-KAI
黃志凱
spellingShingle HUANG, ZHI-KAI
黃志凱
The uniform procedures of penetration test and protection strategies
author_sort HUANG, ZHI-KAI
title The uniform procedures of penetration test and protection strategies
title_short The uniform procedures of penetration test and protection strategies
title_full The uniform procedures of penetration test and protection strategies
title_fullStr The uniform procedures of penetration test and protection strategies
title_full_unstemmed The uniform procedures of penetration test and protection strategies
title_sort uniform procedures of penetration test and protection strategies
publishDate 2018
url http://ndltd.ncl.edu.tw/handle/g56bck
work_keys_str_mv AT huangzhikai theuniformproceduresofpenetrationtestandprotectionstrategies
AT huángzhìkǎi theuniformproceduresofpenetrationtestandprotectionstrategies
AT huangzhikai yīzhìxìngshèntòucèshìchéngxùyǔfánghùcèlüè
AT huángzhìkǎi yīzhìxìngshèntòucèshìchéngxùyǔfánghùcèlüè
AT huangzhikai uniformproceduresofpenetrationtestandprotectionstrategies
AT huángzhìkǎi uniformproceduresofpenetrationtestandprotectionstrategies
_version_ 1719165629591715840