<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
</head>
<body bgcolor="#FFFFFF">
<div>I have a former student now working with IBM in this area who has offered to present to my current students on this topic and with some 'proprietory' industry tools of the trade. <br>
<br>
<b>Kent Beveridge</b>
<div>
<div>ICT Coordinator & Maths teacher</div>
</div>
</div>
<div><br>
On 04/07/2012, at 11:14 AM, "Kevork Krozian" <<a href="mailto:kevork@edulists.com.au">kevork@edulists.com.au</a>> wrote:<br>
<br>
</div>
<div></div>
<blockquote type="cite">
<div><span>Hi folks,</span><br>
<span></span><br>
<span>I am working on a few network security activities at the moment. I have</span><br>
<span>come across a number of tools that are designed for network, wireless and</span><br>
<span>server security testing, probing and checking. These are relevant to a</span><br>
<span>number of KKs such as:</span><br>
<span></span><br>
<span>Outcome 42</span><br>
<span>KK5 - criteria and techniques for testing the security of networked</span><br>
<span>environments</span><br>
<span></span><br>
<span>Outcome 41</span><br>
<span> KK19 - security measures designed to protect the integrity and security</span><br>
<span>of data and information.</span><br>
<span></span><br>
<span>Outcome 31</span><br>
<span> KK8 - the functions, technical underpinnings and sources of worms,</span><br>
<span>Trojans and spyware that intentionally threaten the security of networks</span><br>
<span></span><br>
<span> The tools include the following:</span><br>
<span>1. Superscan - detects open (layer 4 of the OSI) TCP and UDP ports on a</span><br>
<span>target host</span><br>
<span>2. Microsoft Baseline Security Scanner MBSA - carries out security health</span><br>
<span>check on Windows clients and servers with fixes.</span><br>
<span>3. Password crackers , sniffers, protocol inspectors, vulnerability</span><br>
<span>scanners , Exploits, Man in the Middle attack simulator ( Ettercap ),</span><br>
<span>wireless crackers etc - <a href="http://sectools.org/">http://sectools.org/</a></span><br>
<span></span><br>
<span> In fact <a href="http://sectools.org/">http://sectools.org/</a> is quite amazing in analyzing the top 125</span><br>
<span>security tools each year. Wireshark the protocol analyzer tool is in</span><br>
<span>first place. It is free and quite remarkable in the way it peels back</span><br>
<span>the contents of each layer</span><br>
<span>Aircrack-ng is the number 1 wireless security auditing software able to</span><br>
<span>crack 802.11 (only a,b,g ) WEP and WPA-PSK keys once enough packets have</span><br>
<span>been scanned.</span><br>
<span></span><br>
<span> There is also intruder detection (IDS) and intruder prevention</span><br>
<span>(IPS)software that detects an attempt to scan a router's ports and</span><br>
<span>vunlerabilities. An example of this is with Cisco routers that have IDS</span><br>
<span>and IPS capabilities.</span><br>
<span></span><br>
<span>Also keep in mind attacks do not only happen from external sources,</span><br>
<span>therefore internally, networks have to be protected as well. Internal</span><br>
<span>attacks can be from a variety of sources including introduction of</span><br>
<span>devices, files, open wireless access points, rogue employees etc.</span><br>
<span></span><br>
<span>Feel free to use or discard.</span><br>
<span></span><br>
<span>Take Care</span><br>
<span>Kevork</span><br>
<span></span><br>
<span></span><br>
<span></span><br>
<span>_______________________________________________</span><br>
<span><a href="http://www.edulists.com.au">http://www.edulists.com.au</a> - FAQ, Subscribe, Unsubscribe</span><br>
<span>IT Software Development Mailing List kindly supported by</span><br>
<span><a href="http://www.vcaa.vic.edu.au">http://www.vcaa.vic.edu.au</a> - Victorian Curriculum and Assessment Authority and</span><br>
<span><a href="http://www.vcaa.vic.edu.au/vce/studies/infotech/softwaredevel3-4.html">http://www.vcaa.vic.edu.au/vce/studies/infotech/softwaredevel3-4.html</a>
</span><br>
<span><a href="http://www.vitta.org.au">http://www.vitta.org.au</a> - VITTA Victorian Information Technology Teachers Association Inc</span><br>
<span><a href="http://www.swinburne.edu.au/ict/schools">http://www.swinburne.edu.au/ict/schools</a> - Swinburne University</span><br>
</div>
</blockquote>
<style type="text/css">
<!--
div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif"}
li.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif"}
p.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif"}
-->
</style>
<table width="625" border="0">
<tbody>
<tr>
<td width="507">
<p class="MsoNormal"><b style=""><span style="font-size:10.0pt; font-family:"Tahoma","sans-serif"; color:black">St. Brigid's College
</span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt; font-family:"Tahoma","sans-serif"; color:black">97 Robinson Street, Horsham VIC 3400
</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt; font-family:"Tahoma","sans-serif"; color:black">T 03 5382 3545 F 03 5382 0757
</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt; font-family:"Tahoma","sans-serif"; color:black">ABN 72 749 438 155
</span></p>
<p class="MsoNormal"><span style="font-size:10.0pt; font-family:"Tahoma","sans-serif"; color:black"><a href="http://www.stbc.vic.edu.au/"><span style="">www.stbc.vic.edu.au</span></a></span></p>
</td>
<td width="102" rowspan="2"><img src="http://library.stbc.vic.edu.au/StBCLogo.jpg" alt=""></td>
</tr>
<tr>
<td><span class="MsoNormal"><b><i><span style="font-size:18.0pt; font-family:Webdings; color:green">P</span></i></b><b><i><span style="font-size:18.0pt; font-family:"Arial","sans-serif"; color:green">
</span></i></b><b><i><span style="font-size:10.0pt; font-family:"Arial","sans-serif"; color:green">Please consider the environment before printing this email or attachment.</span></i></b><span style="font-size:10.0pt; font-family:"Tahoma","sans-serif"; color:black">
</span></span></td>
</tr>
</tbody>
</table>
<span class="MsoNormal"><span style="font-size:10.0pt; font-family:"Tahoma","sans-serif"; color:black"></span></span>
<table width="625" border="0">
<tbody>
<tr>
<td width="619"><span class="MsoNormal"><span style="font-size:7.5pt; font-family:"Arial","sans-serif"; color:gray">IMPORTANT! This email and any attachments may be confidential. If received in error, please contact us and delete all copies. St. Brigid's College
does not represent or warrant that the attached files are free from computer viruses or other defects. The attached files are provided, and may only be used, on the basis that the user assumes all responsibility for any loss, damage or consequence resulting
directly or indirectly from the use of the attached files, whether caused by the negligence of the sender or not. The liability of St. Brigid's College is limited in any event to either the resupply of the attached files or the cost of having the attached
files resupplied. Any representations or opinions expressed in this email are those of the individual sender, and not necessarily those of St. Brigid's College.</span></span></td>
</tr>
</tbody>
</table>
<br><br>
<P align=center><FONT style="BACKGROUND-COLOR: #ffffff">This message has been scanned for malware by Websense. </FONT><A href="http://www.websense.com/"><FONT style="BACKGROUND-COLOR: #ffffff" color=#000000>www.websense.com</FONT></A></P>
</body>
</html>