Title
Integrate hacking technique into information assurance education
Document Type
Conference Proceeding
Publication Date
5-17-2016
Publication Title
Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016
First Page
381
Last Page
387
Keywords
Cybersecurity, Host exploitation, Network mapping, Post exploitation, Vulnerability scanning
Abstract
© 2016 IEEE. It has become a trend that more and more institutions offer offensive techniques in information assurance education. In this paper, up the discussion of network mapping and vulnerability scanning, gaining access to a target via vulnerability exploitation, and maintaining an access to a victim host through HackerDefender rootkit techniques, we propose integrating the hacking techniques into information security education. Five hands-on lab exercises are proposed and the platform iVLab to conduct the labs are also presented.
Recommended Citation
Yang, Jianhua; Wang, Yien; and Reddington, Thomas, "Integrate hacking technique into information assurance education" (2016). Faculty Bibliography. 2996.
https://csuepress.columbusstate.edu/bibliography_faculty/2996