<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Webdings;
        panose-1:5 3 1 2 1 5 9 6 7 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p
        {mso-style-priority:99;
        mso-margin-top-alt:auto;
        margin-right:0cm;
        mso-margin-bottom-alt:auto;
        margin-left:0cm;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";}
span.msonormal0
        {mso-style-name:msonormal;}
span.EmailStyle19
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body bgcolor=white lang=EN-AU link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span style='color:#1F497D'>Hi Kent,<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>It would be great to hear what is used at your former student’s workplace , at IBM no less.<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Keep well<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><o:p> </o:p></span></p><div><p class=MsoNormal><span style='color:#1F497D'>Kevork Krozian<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Edulists Creator Administrator<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>www.edulists.com.au<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>tel: 0419 356 034<o:p></o:p></span></p></div><p class=MsoNormal><span style='color:#1F497D'><o:p> </o:p></span></p><div><div style='border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm 0cm 0cm'><p class=MsoNormal><b><span lang=EN-US style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span lang=EN-US style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'> sofdev-bounces@edulists.com.au [mailto:sofdev-bounces@edulists.com.au] <b>On Behalf Of </b>Kent Beveridge<br><b>Sent:</b> Wednesday, 4 July 2012 8:10 PM<br><b>To:</b> Year 12 Software Development Teachers' Mailing List<br><b>Subject:</b> Re: [Year 12 SofDev] Security of data and networks<o:p></o:p></span></p></div></div><p class=MsoNormal><o:p> </o:p></p><div><p class=MsoNormal>I have a former student now working with IBM in this area who has offered to present to my current students on this topic and with some 'proprietory' industry tools of the trade. <br><br><b>Kent Beveridge</b> <o:p></o:p></p><div><div><p class=MsoNormal>ICT Coordinator & Maths teacher<o:p></o:p></p></div></div></div><div><p class=MsoNormal style='margin-bottom:12.0pt'><br>On 04/07/2012, at 11:14 AM, "Kevork Krozian" <<a href="mailto:kevork@edulists.com.au">kevork@edulists.com.au</a>> wrote:<o:p></o:p></p></div><blockquote style='margin-top:5.0pt;margin-bottom:5.0pt'><div><p class=MsoNormal>Hi folks,<br><br>I am working on a few network security activities at the moment. I have<br>come across a number of tools that are designed for network, wireless and<br>server security testing, probing and checking. These are relevant to a<br>number of KKs such as:<br><br>Outcome 42<br>KK5 - criteria and techniques for testing the security of networked<br>environments<br><br>Outcome 41<br> KK19 - security measures designed to protect the integrity and security<br>of data and information.<br><br>Outcome 31<br> KK8 - the functions, technical underpinnings and sources of worms,<br>Trojans and spyware that intentionally threaten the security of networks<br><br> The tools include the following:<br>1. Superscan - detects open (layer 4 of the OSI) TCP and UDP ports on a<br>target host<br>2. Microsoft Baseline Security Scanner MBSA - carries out security health<br>check on Windows clients and servers with fixes.<br>3. Password crackers , sniffers, protocol inspectors, vulnerability<br>scanners , Exploits, Man in the Middle attack simulator ( Ettercap ),<br>wireless crackers etc - <a href="http://sectools.org/">http://sectools.org/</a><br><br> In fact <a href="http://sectools.org/">http://sectools.org/</a> is quite amazing in analyzing the top 125<br>security tools each year. Wireshark the protocol analyzer tool is in<br>first place. It is free and quite remarkable in the way it peels back<br>the contents of each layer<br>Aircrack-ng is the number 1 wireless security auditing software able to<br>crack 802.11 (only a,b,g ) WEP and WPA-PSK keys once enough packets have<br>been scanned.<br><br> There is also intruder detection (IDS) and intruder prevention<br>(IPS)software that detects an attempt to scan a router's ports and<br>vunlerabilities. An example of this is with Cisco routers that have IDS<br>and IPS capabilities.<br><br>Also keep in mind attacks do not only happen from external sources,<br>therefore internally, networks have to be protected as well. Internal<br>attacks can be from a variety of sources including introduction of<br>devices, files, open wireless access points, rogue employees etc.<br><br>Feel free to use or discard.<br><br>Take Care<br>Kevork<br><br><br><br>_______________________________________________<br><a href="http://www.edulists.com.au">http://www.edulists.com.au</a> - FAQ, Subscribe, Unsubscribe<br>IT Software Development Mailing List kindly supported by<br><a href="http://www.vcaa.vic.edu.au">http://www.vcaa.vic.edu.au</a> - Victorian Curriculum and Assessment Authority and<br><a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/softwaredevel3-4.html">http://www.vcaa.vic.edu.au/vce/studies/infotech/softwaredevel3-4.html</a> <br><a href="http://www.vitta.org.au">http://www.vitta.org.au</a> - VITTA Victorian Information Technology Teachers Association Inc<br><a href="http://www.swinburne.edu.au/ict/schools">http://www.swinburne.edu.au/ict/schools</a> - Swinburne University<o:p></o:p></p></div></blockquote><table class=MsoNormalTable border=0 cellpadding=0 width=625 style='width:468.75pt'><tr><td width=507 style='width:380.25pt;padding:.75pt .75pt .75pt .75pt'><p class=MsoNormal><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'>St. Brigid's College </span></b><o:p></o:p></p><p class=MsoNormal><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'>97 Robinson Street, Horsham VIC 3400 </span><o:p></o:p></p><p class=MsoNormal><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'>T 03 5382 3545 F 03 5382 0757 </span><o:p></o:p></p><p class=MsoNormal><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'>ABN 72 749 438 155 </span><o:p></o:p></p><p class=MsoNormal><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'><a href="http://www.stbc.vic.edu.au/">www.stbc.vic.edu.au</a></span><o:p></o:p></p></td><td width=102 rowspan=2 style='width:76.5pt;padding:.75pt .75pt .75pt .75pt'><p class=MsoNormal><span style='font-size:12.0pt;font-family:"Times New Roman","serif"'><img border=0 id="_x0000_i1025" src="http://library.stbc.vic.edu.au/StBCLogo.jpg"><o:p></o:p></span></p></td></tr><tr><td style='padding:.75pt .75pt .75pt .75pt'><p class=MsoNormal><span class=msonormal0><b><i><span style='font-size:18.0pt;font-family:Webdings;color:green'>P</span></i></b></span><span class=msonormal0><b><i><span style='font-size:18.0pt;font-family:"Arial","sans-serif";color:green'> </span></i></b></span><span class=msonormal0><b><i><span style='font-size:10.0pt;font-family:"Arial","sans-serif";color:green'>Please consider the environment before printing this email or attachment.</span></i></b></span><span class=msonormal0><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif";color:black'> </span></span><span style='font-size:12.0pt;font-family:"Times New Roman","serif"'><o:p></o:p></span></p></td></tr></table><p class=MsoNormal><span style='font-size:12.0pt;font-family:"Times New Roman","serif";display:none'><o:p> </o:p></span></p><table class=MsoNormalTable border=0 cellpadding=0 width=625 style='width:468.75pt'><tr><td width=619 style='width:464.25pt;padding:.75pt .75pt .75pt .75pt'><p class=MsoNormal><span class=msonormal0><span style='font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'>IMPORTANT! This email and any attachments may be confidential. If received in error, please contact us and delete all copies. St. Brigid's College does not represent or warrant that the attached files are free from computer viruses or other defects. The attached files are provided, and may only be used, on the basis that the user assumes all responsibility for any loss, damage or consequence resulting directly or indirectly from the use of the attached files, whether caused by the negligence of the sender or not. The liability of St. Brigid's College is limited in any event to either the resupply of the attached files or the cost of having the attached files resupplied. Any representations or opinions expressed in this email are those of the individual sender, and not necessarily those of St. Brigid's College.</span></span><span style='font-size:12.0pt;font-family:"Times New Roman","serif"'><o:p></o:p></span></p></td></tr></table><p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-size:12.0pt;font-family:"Times New Roman","serif"'><o:p> </o:p></span></p><p align=center style='text-align:center'><span style='background:white'>This message has been scanned for malware by Websense. </span><a href="http://www.websense.com/"><span style='color:black;background:white'>www.websense.com</span></a><o:p></o:p></p></div></body></html>