In the security industry, we classify our security infrastructure in a variety of ways. One important classification method is called the “CIA Triad,” which refers to three security objectives defined by the Federal Information Security...
Kelly is a network security officer for a large state-run agency in California. Kelly is asked by the IT manager of another state agency to perform a security audit on their network. This audit she...
Kevin, an IT security consultant, is working on contract for Davidson Avionics to audit the company's network. He is given permission to perform any necessary tests. Kevin creates a fake company ID badge and uniform...
Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense’s front end Exchange Server. He was able to get into the server, located in a...
Jason asked his company’s firewall administrator to set the firewall to inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network. Why is this request...
Martin, a network security auditor, is aware that his company uses a switched network, which cannot be sniffed by some programs without some tweaking. What technique could he use to sniff his agency’s switched network?
Paul has just finished setting up his wireless network and has enabled numerous security features such as changing the default SSID, enabling WPA encryption and enabling MAC filtering on his wireless router. Paul notices that...