Ethical Hacking – About Ethical Hacking

Today I will introduce you to Ethical Hacking and Penetration Testing.

Ethical Hacking is the process of attempting to find out the vulnerabilities of a network through penetration testing. It is also used as a security test, where ethical hackers report the vulnerabilities and provide solutions to make the network more secure.

The procedure of penetration testing goes like this:

  • Define the scope of the test, such as providing details on what would be tested and by whom it will be tested
  • Performing the penetration testing
  • Deliver the results of the test.

What does it take to be an ethical hacker? It simply requires you to understand the laws and what you should do legally in your area, knowledge in computers and networks, being able to use the necessary tools and communication.

There are three types of penetration testing methodologies:

  • Black box model: Where the company does not know about the penetration testing and the tester is not given any information about the network. The purpose is to find out whether an attack could be detected by the security
  • White box model: Where sufficient information is given to the tester, and the tester is allowed to ask the company about the network.
  • Grey box model: A hybrid of the white box and black box methods, tester is only given some information about the network

There are also two types of penetration testing teams, the Blue Team and the Red Team. The Red team’s purpose is to find out the system’s vulnerabilities, while the Blue team’s purpose is to figure out how surprise attacks from outside might occur.

There are also other types of methodologies, such as the OSPT. The OSSTMM Professional Security Test (OSPT) is designed by the ISECOM (Institute for Security and Open Methodologies), which is based on the Open Source Security Testing Methodology Manual (OSSTMM). It consists of 5 domains, which are:

  • Information security
  • Process security
  • Internet Technology security
  • Communication security
  • Wireless security

Others such as the ISSAF (Information System Security Assessment Framework) and the OWASP (Open Web Application Security Project) are also different types of methodologies.

Why ethical hacking? In this day, where we use software such as cloud computing to store files, the demand for security is higher as more users are able to access the data. This can lead to hackers exploiting the files that are in the server. To make the data more secure, what we can do is to find out its vulnerabilities, and we can do that through penetration testing. From the results of penetration testing, we can find out the solution to prevent our computers from being attacked.

In ethical hacking, there are things that we can do legally. What we should do is to find out what is legal in our area/country, because some activities are not allowed in some countries (such as port scanning). Over here in Indonesia, we have the UU ITE.

It is also possible to get specific certifications in ethical hacking, one of them being the CEH (Certified Ethical Hacker), which is developed by the International Council of Electronic Commerce Consultants (ECCouncil). Other certifications such as the CompTIA Security+ and Network+ are also able to help for the certification.

COMP6341 – Multimedia & Human Computer Interaction Final Project Proposal

Name: Regita Isada

Binusian ID: 2001586350

Course Name: Multimedia and Human Computer Interaction

Project Name: Match It

Group Members: Regita Isada, Nathania Kezia Barakati

 

ABOUT THE PROJECT

Match It is a memory-matching game where the player has to click through and find two objects/cards that match each  other in a layout of cards. The game is made using Construct 2. This game is aimed for children of kindergarten age so they can learn the different names of animals, fruits and vegetables, as well as strengthen their memory skills.

Match It consists of four levels: two Zoo levels and two Garden levels, with each level has a different theme, difficulty and number of pairs.

HOW THE GAME WORKS

The player has to click on a card and the card will open. Then the player have to click on another card that has the same picture when flipped (e.g. when the player clicks on a card with an apple in it, the player has to find another card that has an apple in it). If the player successfully match two of the same cards, the cards then disappear and will be added to the number of matches. If the player successfully matches all of the cards, the player has completed the level. If the player matches two cards with different pictures, the cards will flip back and they have to find the card that matches it.

Database Systems Final Project – FastCabs Case Study – Regita Isada, Sefira Karina, Nathania Kezia Barakati

Project name: FastCabs Case Study

Course name: Database Systems

Group members: Regita Isada, Sefira Karina, Nathania Kezia Barakati

For our Database Systems, our group had to make a database program for a case study. For my part of the project I was mostly in charge of the coding of the program.

I used Java for the programming language for this project, and the IDE i used to code is Netbeans IDE.

Continue reading “Database Systems Final Project – FastCabs Case Study – Regita Isada, Sefira Karina, Nathania Kezia Barakati”