Advanced Research Cyber Security Essay

1465 words - 6 pages

Due to the growth and success of Advanced Research our systems have recently become a target for hacking and cyber-attacks. As an organization we know of several attempts to steal the intellectual property of Advanced Research and sell the stolen properties to direct competitors. Beyond that we are all aware of the 2011 issues involving Advanced Research’s public website, website defacement and Denial of Service (DoS) attacks are common tactics of attackers. Also in today’s cyber climate it is well known that any organization, no matter the size or prestige, with a cyber-presence is vulnerable to attacks and exploits.
The fact is that Advanced Research needs to become proactive in our approach to cyber security. Simply put, the best way to defend our cyber property is to perform comprehensive vulnerability scans across all of our systems. It is my recommendation as the IT Manager that Advanced Research procures and implements the extensive use of Metasploit Framework products to safeguard its systems.
Overview of Metasploit Framework and Metasploit Pro
Metasploit Pro is the commercial version of the Metasploit Framework (MSF). MSF was originally conceived and founded by professional penetration tester HD Moore. Mr. Moore set out to build an open source platform that would provide “a consistent, reliable library of constantly updated exploits and offers a complete development environment for building new tools and automating every aspect of a penetration test”. (David Kennedy, 2011)
MSF, released to the public in 2003, offers basic functionality and uses a command-line for exploits. Because of the command-line structure of the environment, MSF is largely used by developers and researchers. The MSF command-line although useful, is not intuitive to most users and even many IT professionals. Conversely, the enterprise version of the MSF tool, Metasploit Pro enables all of the features of Metasploit, and includes enhanced “productivity and advanced attack” tools. (Kirsch, 2013) Metasploit Pro boasts increased usability and stronger data management methods, increasing the overall effectiveness of the product and productivity of IT security professionals.
Some of the increased and added features of Metasploit Pro are:
• Large Engagement Data Management – automatically tracks all “hosts, services, vulnerabilities and evidence”. (Kirsch, 2013) Includes import and consolidation tools, search features, outlier identification, host tagging, evidence storage, and audit trails.
• Security Auditing Wizard – takes the penetration tester through the steps of a “typical engagement” (Kirsch, 2013), saving time for seasoned penetration testers, and getting new testers up to speed quickly.
• MetaModules – automated security tests for penetration tests such as, passive network discovery, and firewall egress testing.
• Web UI and Enhanced Command-Line Console – a web-based graphical user interface is available making Metasploit Pro easier to use for non-experts,...

Find Another Essay On Advanced Research Cyber Security

Cyber Security Controls As a Public Good

2486 words - 10 pages attacked by these criminals through telephone, online social networking sites or email, and persuasion. Everyone must be made aware of these tactics and be mindful of information they may provide to others (Kee, 2008). Research conducted by the National Cyber Security Alliance and Computer Associates discovered that 75 percent of computer users provide personal information to social networking sites. Providing personal information to social

Cyber-Warfare: The Importance of the New Digital Battlefield

2258 words - 9 pages . Academic Search Complete, EBSCOhost (accessed March 21, 2011). Thomas C. Wingfield, 2000 “The Law of Information Conflict: National Security” Law in Cyberspace 17 (Aegis Research Coqj). Thornburgh, Nathan. “The Invasion of the Chinese Cyberspies - TIME.” http://www.time.com/time/magazine/article/0,9171,1098961,00.html. Trias, Eric D., and Bryan M. Bell. 2010. "Cyber This, Cyber That ... So What?." Air & Space Power Journal 24, no. 1: 90-100. Academic Search Complete, EBSCOhost (accessed March 21, 2011).

From Hacking to Cyber Terrorism

4086 words - 16 pages From Hacking to Cyber Terrorism Introduction Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time

Cyber Attacks on the Government’s Transportation Grid

3326 words - 13 pages Breaches and Security Implications by Penetration of the Western Interconnection’s Traffic Control System and its Effects on Modern Day Life Year after year, a number of films are released involving computer hacking of some sort along with cyber-villainy. As entertaining as they are, the validity of these possibilities is not explored. Many of these films center revolve around a chaotic vehicle-related scene where a form of the

Military Cyber: An Evolution In Command Relationships

1693 words - 7 pages deconflict how information related capabilites in order to synchronize operations. A working relationship with the J6 is also important as cyber dominance is not impossible without network security. Figure 1 depicts a JTF structure with the addition of a JFCCC. Cyber will be a priority with this structure and greater coordination between functional component commanders will be required. The JFCCC would be tasked like the JFACC, with the

Cyber Bullying: An Uncontrollable Epidemic

2169 words - 9 pages while cyber bullying victims were 2.9 times more likely to commit suicide. According to Cyber Bully Research Center, 20% of respondents reported seriously thinking about attempting suicide. The small but significant variation found in suicidal thoughts and actions based on bullying and cyber bullying suggests that all forms of adolescent peer aggression must be taken seriously- both at school and at home (Hinduha and Patchin). Due to the growth of

Cyber-Crime is a Serious Problem

2338 words - 9 pages Millions of people around the world use computers and the internet every day. We all use it in school, work even at home, computers have made us life easier, it has brought so many benefits to the society but it has also brought some problems and cybercrimes is one of them. “The times have really changed,” said Greg Garcia, the department’s assistant secretary for cyber security and communications. “We’re seeing now phishing, farming, botnets

Cyber Security Departments

2823 words - 11 pages ://fcw.com/articles/2013/04/02/cyber-engagement-international-law.aspx>. Communication Technologies, Inc. "Supervisory Control and Data Acquisition (SCADA) Systems." National Communications Systems. U.S Department of Homeland Security, Oct. 2004. Web. 25 Apr. 2013. . Defence Forces Technical Research Centre. "Electronics and Information Technology Division." Puolustusvoimat

Chinese Cyber Espionage

1175 words - 5 pages Mandiant Report APT1 Exposing One of China’s Cyber Espionage Units Mandiant APT1 Report Mandiant is an information security company which deals with the advanced threat detections and response solutions. It has investigated various computer security breaches, the major security breaches are attributed to advanced threat actors referred to as the “Advanced Persistent Threat” (APT). APT1 is one of the most prolific cyber espionage groups in

Cyber Bullying

1426 words - 6 pages -face, and they feel like they won't be held accountable in the same way. It gives them a false sense of security and power." The increasing growth in computer use allows kids to spend more time on the Internet. Kullback says, "Ten years ago, if a kid got bullied he could go home and sit in front of the TV." Nowadays, with children spending so much time on the computer, whether to shop, do research for schoolwork, play games or hang out with

Cyber Socializing Has Effects

1905 words - 8 pages United Way, and the Sioux Falls Area Foundation, have contributed their part in helping the Carroll Institute’s cyber bullying prevention causes by creating “Project Awareness.” "We're seeing in the research really a peak around 7th and 8th grade and we also hear that from kids, administrators, and teachers," Betsy Atwood says (Janssen np). But there have also been local students to voice their opinions on the cyber bullying issue. A group of

Similar Essays

Living In The Information Age Essay

597 words - 3 pages the majority. America’s Effort in Thwarting Cyber-attacks Homeland Security (2014) reveals that the Secret Service has an Electronic Crimes Task Force, which focuses on locating and identifying Cyber criminals. This commission contributed to the arrest of international cyber criminals who are responsible for the loss of $600 million. The Secret service also controls the National Computer Forensic institute. This organization has an obligation

The Evolution Of Cyber Attacks Over The Past Years

2064 words - 8 pages Institute. (Wikipedia, 2013) The CERT/CC is part of the CERT program, which “partners with government, industry, law enforcement, and academia to develop advanced methods and technologies to counter large-scale, sophisticated cyber threats.” (Wikipedia, 2013) The CERT/CC website states that the team studies Internet security and vulnerabilities, and provides research and training to help improve security. They also publish regular alerts regarding

Cyber Crime: What Is Hacking? Essay

1313 words - 6 pages Engineering 3.7 (2013): 534-45. ProQuest. Web. 27 Feb. 2014. Himma, Kenneth Einar. Internet Security: Hacking, Counterhacking, and Society. Sudbury, MA: Jones and Bartlett, 2007. Print. Morrison, Scott, and Christopher Condon. "Phishing, Pharming and Fraud: How Hackers' Prying Eyes Threaten Confidence in Online Commerce." Financial Times (2005)ProQuest. Web. 4 Mar. 2014. "OCC Warns of Hacking by Cyber-Terrorists." ABA Bank Compliance 20.4 (1999): 11. ProQuest. Web. 27 Feb. 2014. Rennie, Lara, and Malcolm Shore. "An Advanced Model of Hacking." Security Journal 20.4 (2007): 236-51. ProQuest. Web. 27 Feb. 2014.

Role Of The National Cyberspace For American National Security

3032 words - 12 pages called "Sputnik." This frightened Dwight D. Eisenhower, who was the president of the United States at the time, because if the Soviet Union could launch a satellite into space, they could potentially attack the United States with missles which would be devastating to North America. In response to the Soviet Union's launch of Sputnik, President Eisenhower created the Advanced Research Projects Agency, also known as ARPA. The purpose of ARPA was to