The uniform procedures of penetration test and protection strategies
碩士 === 開南大學 === 資訊學院碩士班 === 106 === Nowadays, Internet is especially important. While we are in information society, hackers are prevalent threats that may cause massive damage/loss. Although not all hackers are malicious, some of them have done offensive attacks. For example, ATM was stolen more th...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/g56bck |
id |
ndltd-TW-106KNU00392003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106KNU003920032019-05-16T00:22:59Z http://ndltd.ncl.edu.tw/handle/g56bck The uniform procedures of penetration test and protection strategies 一致性滲透測試程序與防護策略 HUANG, ZHI-KAI 黃志凱 碩士 開南大學 資訊學院碩士班 106 Nowadays, Internet is especially important. While we are in information society, hackers are prevalent threats that may cause massive damage/loss. Although not all hackers are malicious, some of them have done offensive attacks. For example, ATM was stolen more than NT $ 80 million by hackers, resulting in the loss of money in Taiwan’s First Bank in July 2016 year. IT managers led to everchanging pattern difficult to prepare, but also allow more victims leakage of personal information, we need to think of a solution to the so-called "Know thyself, know yourself", first clearly know each other means, in order to come up with corresponding manner. Hacking attacks are divided into five steps: Reconnaissance, Scanning, Gaining Access, Maintaining Access, and Covering tracks. The research mainly uses Kali Linux system to implement five major steps of the hacker program. This study would help IT managers, engineers understand hacking procedures, and thus help them propose corresponding methods of protection. In Kali Linux system itself has more than six hundred kinds of penetration tools, hackers program in accordance with the classification of the five steps to achieve tool, users will not have to reduce from six hundred kinds of penetration tool to screen to be used. HSU, JUNG-LUNG 許榮隆 2018 學位論文 ; thesis 60 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 開南大學 === 資訊學院碩士班 === 106 === Nowadays, Internet is especially important. While we are in information
society, hackers are prevalent threats that may cause massive damage/loss.
Although not all hackers are malicious, some of them have done offensive attacks.
For example, ATM was stolen more than NT $ 80 million by hackers, resulting in
the loss of money in Taiwan’s First Bank in July 2016 year. IT managers led to everchanging
pattern difficult to prepare, but also allow more victims leakage of
personal information, we need to think of a solution to the so-called "Know thyself,
know yourself", first clearly know each other means, in order to come up with
corresponding manner. Hacking attacks are divided into five steps: Reconnaissance,
Scanning, Gaining Access, Maintaining Access, and Covering tracks. The research
mainly uses Kali Linux system to implement five major steps of the hacker program.
This study would help IT managers, engineers understand hacking procedures, and
thus help them propose corresponding methods of protection. In Kali Linux system
itself has more than six hundred kinds of penetration tools, hackers program in
accordance with the classification of the five steps to achieve tool, users will not
have to reduce from six hundred kinds of penetration tool to screen to be used.
|
author2 |
HSU, JUNG-LUNG |
author_facet |
HSU, JUNG-LUNG HUANG, ZHI-KAI 黃志凱 |
author |
HUANG, ZHI-KAI 黃志凱 |
spellingShingle |
HUANG, ZHI-KAI 黃志凱 The uniform procedures of penetration test and protection strategies |
author_sort |
HUANG, ZHI-KAI |
title |
The uniform procedures of penetration test and protection strategies |
title_short |
The uniform procedures of penetration test and protection strategies |
title_full |
The uniform procedures of penetration test and protection strategies |
title_fullStr |
The uniform procedures of penetration test and protection strategies |
title_full_unstemmed |
The uniform procedures of penetration test and protection strategies |
title_sort |
uniform procedures of penetration test and protection strategies |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/g56bck |
work_keys_str_mv |
AT huangzhikai theuniformproceduresofpenetrationtestandprotectionstrategies AT huángzhìkǎi theuniformproceduresofpenetrationtestandprotectionstrategies AT huangzhikai yīzhìxìngshèntòucèshìchéngxùyǔfánghùcèlüè AT huángzhìkǎi yīzhìxìngshèntòucèshìchéngxùyǔfánghùcèlüè AT huangzhikai uniformproceduresofpenetrationtestandprotectionstrategies AT huángzhìkǎi uniformproceduresofpenetrationtestandprotectionstrategies |
_version_ |
1719165629591715840 |