Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention

Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention

Nabie Y. Conteh (Southern University at New Orleans, USA)
ISBN13: 9781799865049|ISBN10: 1799865045|EISBN13: 9781799865063|DOI: 10.4018/978-1-7998-6504-9


Cybersecurity is the practice of protecting systems, computing devices and data assets that are connected to the Internet, the interconnected network of networks. These include but are not limited to hardware, software, data centers, databases and data assets. It is geared towards protecting them not only from cyber-threats but eliminating any and all vulnerabilities. They include the methods and techniques that are utilized by individuals and enterprises alike with a view to protecting the computers, servers, networks, web applications, mobile devices and the data stored on these devices from black hat attackers (with malicious intent) and to stop against unauthorized access.

This publication serves as a comprehensive text that covers all the contemporary and hands-on areas of cybersecurity and how they can be applied to understanding the techniques and methods of ethical hacking with a view to serving as preventative as well as countermeasures to cyber-theft and attacks with malicious intents. The book will cover several cybersecurity related areas such as authentication, access control and related topics which can include Cryptography. The text will further discuss the attack phases of reconnaissance, scanning, gaining access, maintaining access and covering tracks. It will explain and define who an ethical hacker is, as well as the skills and the concept of ethical hacking. It will also cover viruses and worms, sniffers: their type, their method of attack and how to detect sniffing. Other topics like denial of service, brute force attacks and buffer overflows will also be covered. A detailed discussion of session hacking, the hacking of web servers, and the vulnerabilities of web application will be addressed and it will cover the economics of cybersecurity, privacy issues as well as the legal and ethical issues of web application programs, data, and the rights of employees.

The primary objective of this publication is to provide a concise but comprehensive text on cybersecurity that can be used by students, faculty, researchers in higher education and consultants and professionals such as ethical hackers, computer forensic experts, and private institutions. It can also serve as a guide for certification training, the study of countermeasures to prevent and stop cybercrimes, cyberterrorism, cybertheft, identity theft, and computer related crimes.

Table of Contents and List of Contributors

Search this Book: