Está en la página 1de 25

Ethical Hacking and

Countermeasures
Version 6

Module LXII
Case Studies
Hawaii Safeguards Schools Statewide
g Intrusion Protection Systems
Using y

Source: http://www.tippingpoint.com

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
U.S. Army Project Office Relies on Novell
Solutions for a High
g Level of Securityy

Source: http://www.novell.com

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
McAfee Gives RPC Comprehensive
Visibility into its Critical Systems with
Operational Efficiency

Source: http://i.i.com.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Cumberland Bank Find Solution to
Monitor the Securityy and Performance

Source: http://www.goldleaf.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SurfControl Enterprise Protection Suite Protects
Thousands at Glenbrook Schools Against Internet
Dangers

Source: http://www.surfcontrol.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Arbor Uncovers Worm Infections Inside
One of the Worlds Largest
g Banks

Source: http://www.arbornetworks.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Imperial Chemical Industries PLC -
Enforcing
g Securityy SLAs of Outsourcers

Source: http://www.qualys.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Penetration Testing: Case Study

Source: http://www.procheckup.com/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Security Penetration Testing

Source: http://wipro.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Hacking Case Study

Source: http://www.cy4or.co.uk/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Evil Jimmy the Hacker as He Scans a
Small Company Called Little Company
N t
Network k (LCN)

Source: http://www.ciscopress.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
PwC Integrates AppScan into Threat and
Vulnerability Practice Enabling Rapid
Application Security

Source: http://www.watchfire.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Case Study for RSS

Source: http://www.encription.co.uk/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IT Consulting Firm Improves E-Mail
Filtering, Increases Productivity With New
Solution

Source: http://download.microsoft.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Postbank Signs Customer E-mails With
Team Certificates From TC TrustCenter, To
Protect its Customers Against Phishing

Source: http://www.trustcenter.de/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
University Limits Spam, Reduces IT
Costs With
t E-Mail
a Filtering
te g Se
Service
ce

Source: http://download.microsoft.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Hooking Phishing Emails Before They Reach
Customers with Online Fraud Management Service

Source: http://eval.veritas.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Corporate Espionage: Case Study

Source: http://csrc.nist.gov/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Making Data Security a Top Priority for
Leading IT Provider to the Airline Industry

Source: http://eval.veritas.com/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Eliminating Spam In Its Tracks with Multi-
Layered Solutions from Symantec

Source: http://eval.veritas.com/mktginfo/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Captus Networks Helps Prevent Denial of
Service Attacks with Intel Network
Adapters for Multi-gigabit
Multi gigabit Scalability
Scalabilit

Source: http://www.intel.com/network/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Bellingham+Stanley Implement
Integrated Solution For Web And Email
Security
Securit

Source: http://www.insight.co.uk/files/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Australian Company Implements Worlds
Largest
g Biometric Voice ID System
y

Source: http://www.searchsecurity.com.au/

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Summary

This module has drawn various cases of information


theft and security around the world

It draws a picture of various practical applications that


many companies have adopted to enhance security of
their assets

Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited

También podría gustarte