This website uses cookies to ensure you have the best experience. Learn more

Advanced Research Cyber Security Essay

1465 words - 6 pages

Due to the growth and success of Advanced Research our systems have recently become a target for hacking and cyber-attacks. As an organization we know of several attempts to steal the intellectual property of Advanced Research and sell the stolen properties to direct competitors. Beyond that we are all aware of the 2011 issues involving Advanced Research’s public website, website defacement and Denial of Service (DoS) attacks are common tactics of attackers. Also in today’s cyber climate it is well known that any organization, no matter the size or prestige, with a cyber-presence is vulnerable to attacks and exploits.
The fact is that Advanced Research needs to become proactive in our approach to cyber security. Simply put, the best way to defend our cyber property is to perform comprehensive vulnerability scans across all of our systems. It is my recommendation as the IT Manager that Advanced Research procures and implements the extensive use of Metasploit Framework products to safeguard its systems.
Overview of Metasploit Framework and Metasploit Pro
Metasploit Pro is the commercial version of the Metasploit Framework (MSF). MSF was originally conceived and founded by professional penetration tester HD Moore. Mr. Moore set out to build an open source platform that would provide “a consistent, reliable library of constantly updated exploits and offers a complete development environment for building new tools and automating every aspect of a penetration test”. (David Kennedy, 2011)
MSF, released to the public in 2003, offers basic functionality and uses a command-line for exploits. Because of the command-line structure of the environment, MSF is largely used by developers and researchers. The MSF command-line although useful, is not intuitive to most users and even many IT professionals. Conversely, the enterprise version of the MSF tool, Metasploit Pro enables all of the features of Metasploit, and includes enhanced “productivity and advanced attack” tools. (Kirsch, 2013) Metasploit Pro boasts increased usability and stronger data management methods, increasing the overall effectiveness of the product and productivity of IT security professionals.
Some of the increased and added features of Metasploit Pro are:
• Large Engagement Data Management – automatically tracks all “hosts, services, vulnerabilities and evidence”. (Kirsch, 2013) Includes import and consolidation tools, search features, outlier identification, host tagging, evidence storage, and audit trails.
• Security Auditing Wizard – takes the penetration tester through the steps of a “typical engagement” (Kirsch, 2013), saving time for seasoned penetration testers, and getting new testers up to speed quickly.
• MetaModules – automated security tests for penetration tests such as, passive network discovery, and firewall egress testing.
• Web UI and Enhanced Command-Line Console – a web-based graphical user interface is available making Metasploit Pro easier to use for non-experts,...

Find Another Essay On Advanced Research Cyber Security

CyberCrime: What is Hacking? Essay

1313 words - 6 pages Engineering 3.7 (2013): 534-45. ProQuest. Web. 27 Feb. 2014. Himma, Kenneth Einar. Internet Security: Hacking, Counterhacking, and Society. Sudbury, MA: Jones and Bartlett, 2007. Print. Morrison, Scott, and Christopher Condon. "Phishing, Pharming and Fraud: How Hackers' Prying Eyes Threaten Confidence in Online Commerce." Financial Times (2005)ProQuest. Web. 4 Mar. 2014. "OCC Warns of Hacking by Cyber-Terrorists." ABA Bank Compliance 20.4 (1999): 11. ProQuest. Web. 27 Feb. 2014. Rennie, Lara, and Malcolm Shore. "An Advanced Model of Hacking." Security Journal 20.4 (2007): 236-51. ProQuest. Web. 27 Feb. 2014.

The Need for a Well Organized Response to Cyber Attack

909 words - 4 pages cyber-security firm, estimated the total cost of cyber-crime to be worth US$338bn per year.2 Outages in the submarine infrastructure off the coast of Egypt resulted in a severe degradation of internet speeds across many countries in the Middle East and parts of Asia.3 In this issue brief 4 the results of three research projects gathering empirical evidence regarding information sharing 5 are discussed, drawing lessons relevant to the situation

Computer Crime

1796 words - 8 pages cyber-criminals sneaky deceptions. There are four main types of cyber-criminals. The first type is children and adolescents between the ages of 6 and 18. This group is believed to commit cyber-crimes because of their need to explore things. Also they think this will make them look more advanced when compared to other children of the same age (Dashora 244). The second group of cyber criminals have earned the name “organized hackers.” They are

Cyber Security

1953 words - 8 pages Research and development in the Cyber Security field The Cyber Security Research Alliance A non-profit consortium founded by industry stakeholders as a forum develop R&D strategy to address grand challenges in cyber security, and to facilitate public-private partnerships that define a more focused, coordinated, and concerted approach to cyber security research and development. Its founding member are AMD, Honeywell, Intel, and Lockheed Martin

Role of the National Cyberspace for American National Security

3032 words - 12 pages called "Sputnik." This frightened Dwight D. Eisenhower, who was the president of the United States at the time, because if the Soviet Union could launch a satellite into space, they could potentially attack the United States with missles which would be devastating to North America. In response to the Soviet Union's launch of Sputnik, President Eisenhower created the Advanced Research Projects Agency, also known as ARPA. The purpose of ARPA was to

Cyber Security Controls As a Public Good

2486 words - 10 pages attacked by these criminals through telephone, online social networking sites or email, and persuasion. Everyone must be made aware of these tactics and be mindful of information they may provide to others (Kee, 2008). Research conducted by the National Cyber Security Alliance and Computer Associates discovered that 75 percent of computer users provide personal information to social networking sites. Providing personal information to social

Cyber-Warfare: The Importance of the New Digital Battlefield

2258 words - 9 pages . Academic Search Complete, EBSCOhost (accessed March 21, 2011). Thomas C. Wingfield, 2000 “The Law of Information Conflict: National Security” Law in Cyberspace 17 (Aegis Research Coqj). Thornburgh, Nathan. “The Invasion of the Chinese Cyberspies - TIME.” http://www.time.com/time/magazine/article/0,9171,1098961,00.html. Trias, Eric D., and Bryan M. Bell. 2010. "Cyber This, Cyber That ... So What?." Air & Space Power Journal 24, no. 1: 90-100. Academic Search Complete, EBSCOhost (accessed March 21, 2011).

Cyber Crime

840 words - 4 pages and Sivanesar, 2013, p 98). Computer users across the globe are facing threat, due to the rise in cases of cyber crime, and this is necessitating the intervention of the government through enactment of policies that govern the usage of computer technology. According to Richardson (2008, p 3), cyber crime has grown to catastrophic levels thus posing a challenge to global security. Consequently, besides cyber crime affecting the security of

From Hacking to Cyber Terrorism

4086 words - 16 pages From Hacking to Cyber Terrorism Introduction Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time

Cyber Attacks on the Government’s Transportation Grid

3326 words - 13 pages Breaches and Security Implications by Penetration of the Western Interconnection’s Traffic Control System and its Effects on Modern Day Life Year after year, a number of films are released involving computer hacking of some sort along with cyber-villainy. As entertaining as they are, the validity of these possibilities is not explored. Many of these films center revolve around a chaotic vehicle-related scene where a form of the

Military Cyber: An Evolution In Command Relationships

1693 words - 7 pages deconflict how information related capabilites in order to synchronize operations. A working relationship with the J6 is also important as cyber dominance is not impossible without network security. Figure 1 depicts a JTF structure with the addition of a JFCCC. Cyber will be a priority with this structure and greater coordination between functional component commanders will be required. The JFCCC would be tasked like the JFACC, with the

Similar Essays

The Republic Of India Essay

936 words - 4 pages in the field of cyber security. What happened in the past? The roots of Internet can be traced back to the efforts by the Defense Advanced Research Projects Agency (DARPA) of the US Department of Defense (DOD) to create a network for communication that would endure a nuclear exchange between the two superpowers. The network was subsequently used in the field of academics as a means of communicating and collaborating on research projects. In

Cyber Warfare: Defending Against A New Form Of Terrorism

972 words - 4 pages Introduction Cyber warfare is a new type of terrorism is the United States. The United States National Security Team is responsible for handling computer warfare battles against hackers. The government should invest more money and resources in cyber warfare defense to protect our nation’s economy and infrastructure that is heavily dependent on technology. Imminent Threat The threat of a cyber-attack on our nation’s infrastructure is now viewed

Living In The Information Age Essay

597 words - 3 pages the majority. America’s Effort in Thwarting Cyber-attacks Homeland Security (2014) reveals that the Secret Service has an Electronic Crimes Task Force, which focuses on locating and identifying Cyber criminals. This commission contributed to the arrest of international cyber criminals who are responsible for the loss of $600 million. The Secret service also controls the National Computer Forensic institute. This organization has an obligation

The Evolution Of Cyber Attacks Over The Past Years

2064 words - 8 pages Institute. (Wikipedia, 2013) The CERT/CC is part of the CERT program, which “partners with government, industry, law enforcement, and academia to develop advanced methods and technologies to counter large-scale, sophisticated cyber threats.” (Wikipedia, 2013) The CERT/CC website states that the team studies Internet security and vulnerabilities, and provides research and training to help improve security. They also publish regular alerts regarding