Ce hv6 module 62 case studies

25
Ethical Hacking and Countermeasures Countermeasures Version 6 Module LXII Module LXII Case Studies

description

Ce hv6 module 62 case studies

Transcript of Ce hv6 module 62 case studies

Page 1: Ce hv6 module 62 case studies

Ethical Hacking and CountermeasuresCountermeasuresVersion 6

Module LXIIModule LXII

Case Studies

Page 2: Ce hv6 module 62 case studies

Hawaii Safeguards Schools Statewide Using Intrusion Protection Systemsg y

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.tippingpoint.com

Page 3: Ce hv6 module 62 case studies

U.S. Army Project Office Relies on Novell¨Solutions for a High Level of Securityg y

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.novell.com

Page 4: Ce hv6 module 62 case studies

McAfee Gives RPC Comprehensive Visibility into its Critical Systems with Operational EfficiencyOperational Efficiency

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://i.i.com.com/

Page 5: Ce hv6 module 62 case studies

Cumberland Bank Find Solution to Monitor the Security and Performancey

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.goldleaf.com/

Page 6: Ce hv6 module 62 case studies

SurfControl Enterprise Protection Suite Protects Thousands at Glenbrook Schools Against Internet DangersDangers

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.surfcontrol.com/

Page 7: Ce hv6 module 62 case studies

Arbor Uncovers Worm Infections Inside One of the World’s Largest Banksg

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.arbornetworks.com/

Page 8: Ce hv6 module 62 case studies

Imperial Chemical Industries PLC -Enforcing Security SLAs of Outsourcersg y

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.qualys.com/

Page 9: Ce hv6 module 62 case studies

Penetration Testing: Case Study

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.procheckup.com/

Page 10: Ce hv6 module 62 case studies

Security Penetration Testing

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://wipro.com/

Page 11: Ce hv6 module 62 case studies

Hacking Case Study

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.cy4or.co.uk/

Page 12: Ce hv6 module 62 case studies

Evil Jimmy the Hacker as He Scans a Small Company Called Little Company N t k (LCN)Network (LCN)

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.ciscopress.com/

Page 13: Ce hv6 module 62 case studies

PwC Integrates AppScan into Threat and Vulnerability Practice Enabling Rapid Application SecurityApplication Security

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.watchfire.com/

Page 14: Ce hv6 module 62 case studies

Case Study for RSS

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.encription.co.uk/

Page 15: Ce hv6 module 62 case studies

IT Consulting Firm Improves E-Mail Filtering, Increases Productivity With New SolutionSolution

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://download.microsoft.com/

Page 16: Ce hv6 module 62 case studies

Postbank Signs Customer E-mails With Team Certificates From TC TrustCenter, To Protect its Customers Against PhishingProtect its Customers Against Phishing

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.trustcenter.de/

Page 17: Ce hv6 module 62 case studies

University Limits Spam, Reduces IT Costs With E-Mail Filtering ServiceCosts t a te g Se ce

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://download.microsoft.com/

Page 18: Ce hv6 module 62 case studies

Hooking “Phishing” Emails Before They Reach Customers with Online Fraud Management Service

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://eval.veritas.com/

Page 19: Ce hv6 module 62 case studies

Corporate Espionage: Case Study

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://csrc.nist.gov/

Page 20: Ce hv6 module 62 case studies

Making Data Security a Top Priority for Leading IT Provider to the Airline Industry

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://eval.veritas.com/

Page 21: Ce hv6 module 62 case studies

Eliminating Spam In Its Tracks with Multi-Layered Solutions from Symantec

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://eval.veritas.com/mktginfo/

Page 22: Ce hv6 module 62 case studies

Captus Networks Helps Prevent Denial of Service Attacks with Intel® Network Adapters for Multi gigabit ScalabilitAdapters for Multi-gigabit Scalability

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.intel.com/network/

Page 23: Ce hv6 module 62 case studies

Bellingham+Stanley Implement Integrated Solution For Web And Email SecuritSecurity

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.insight.co.uk/files/

Page 24: Ce hv6 module 62 case studies

Australian Company Implements World’s Largest Biometric Voice ID Systemg y

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.searchsecurity.com.au/

Page 25: Ce hv6 module 62 case studies

SummarySummary

This module has drawn various cases of information theft and security around the world

It draws a picture of various practical applications that many companies have adopted to enhance security of many companies have adopted to enhance security of their assets

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited