0
Ethical Hacking and
CountermeasuresCountermeasures
Version 6
Module LXIIModule LXII
Case Studies
Hawaii Safeguards Schools Statewide
Using Intrusion Protection Systemsg y
EC-Council
Copyright © by EC-Council
All Rights ...
U.S. Army Project Office Relies on Novell¨
Solutions for a High Level of Securityg y
EC-Council
Copyright © by EC-Council
...
McAfee Gives RPC Comprehensive
Visibility into its Critical Systems with
Operational EfficiencyOperational Efficiency
EC-C...
Cumberland Bank Find Solution to
Monitor the Security and Performancey
EC-Council
Copyright © by EC-Council
All Rights Res...
SurfControl Enterprise Protection Suite Protects
Thousands at Glenbrook Schools Against Internet
DangersDangers
EC-Council...
Arbor Uncovers Worm Infections Inside
One of the World’s Largest Banksg
EC-Council
Copyright © by EC-Council
All Rights Re...
Imperial Chemical Industries PLC -
Enforcing Security SLAs of Outsourcersg y
EC-Council
Copyright © by EC-Council
All Righ...
Penetration Testing: Case Study
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibi...
Security Penetration Testing
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited...
Hacking Case Study
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: h...
Evil Jimmy the Hacker as He Scans a
Small Company Called Little Company
N t k (LCN)Network (LCN)
EC-Council
Copyright © by...
PwC Integrates AppScan into Threat and
Vulnerability Practice Enabling Rapid
Application SecurityApplication Security
EC-C...
Case Study for RSS
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: h...
IT Consulting Firm Improves E-Mail
Filtering, Increases Productivity With New
SolutionSolution
EC-Council
Copyright © by E...
Postbank Signs Customer E-mails With
Team Certificates From TC TrustCenter, To
Protect its Customers Against PhishingProte...
University Limits Spam, Reduces IT
Costs With E-Mail Filtering ServiceCosts t a te g Se ce
EC-Council
Copyright © by EC-Co...
Hooking “Phishing” Emails Before They Reach
Customers with Online Fraud Management Service
EC-Council
Copyright © by EC-Co...
Corporate Espionage: Case Study
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibi...
Making Data Security a Top Priority for
Leading IT Provider to the Airline Industry
EC-Council
Copyright © by EC-Council
A...
Eliminating Spam In Its Tracks with Multi-
Layered Solutions from Symantec
EC-Council
Copyright © by EC-Council
All Rights...
Captus Networks Helps Prevent Denial of
Service Attacks with Intel® Network
Adapters for Multi gigabit ScalabilitAdapters ...
Bellingham+Stanley Implement
Integrated Solution For Web And Email
SecuritSecurity
EC-Council
Copyright © by EC-Council
Al...
Australian Company Implements World’s
Largest Biometric Voice ID Systemg y
EC-Council
Copyright © by EC-Council
All Rights...
SummarySummary
This module has drawn various cases of information
theft and security around the world
It draws a picture o...
Upcoming SlideShare
Loading in...5
×

Ce hv6 module 62 case studies

88

Published on

Ce hv6 module 62 case studies

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
88
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Ce hv6 module 62 case studies"

  1. 1. Ethical Hacking and CountermeasuresCountermeasures Version 6 Module LXIIModule LXII Case Studies
  2. 2. Hawaii Safeguards Schools Statewide Using Intrusion Protection Systemsg y EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.tippingpoint.com
  3. 3. U.S. Army Project Office Relies on Novell¨ Solutions for a High Level of Securityg y EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.novell.com
  4. 4. McAfee Gives RPC Comprehensive Visibility into its Critical Systems with Operational EfficiencyOperational Efficiency EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://i.i.com.com/
  5. 5. Cumberland Bank Find Solution to Monitor the Security and Performancey EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.goldleaf.com/
  6. 6. SurfControl Enterprise Protection Suite Protects Thousands at Glenbrook Schools Against Internet DangersDangers EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.surfcontrol.com/
  7. 7. Arbor Uncovers Worm Infections Inside One of the World’s Largest Banksg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.arbornetworks.com/
  8. 8. Imperial Chemical Industries PLC - Enforcing Security SLAs of Outsourcersg y EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.qualys.com/
  9. 9. Penetration Testing: Case Study EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.procheckup.com/
  10. 10. Security Penetration Testing EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://wipro.com/
  11. 11. Hacking Case Study EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.cy4or.co.uk/
  12. 12. Evil Jimmy the Hacker as He Scans a Small Company Called Little Company N t k (LCN)Network (LCN) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.ciscopress.com/
  13. 13. PwC Integrates AppScan into Threat and Vulnerability Practice Enabling Rapid Application SecurityApplication Security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.watchfire.com/
  14. 14. Case Study for RSS EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.encription.co.uk/
  15. 15. IT Consulting Firm Improves E-Mail Filtering, Increases Productivity With New SolutionSolution EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://download.microsoft.com/
  16. 16. Postbank Signs Customer E-mails With Team Certificates From TC TrustCenter, To Protect its Customers Against PhishingProtect its Customers Against Phishing EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.trustcenter.de/
  17. 17. University Limits Spam, Reduces IT Costs With E-Mail Filtering ServiceCosts t a te g Se ce EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://download.microsoft.com/
  18. 18. Hooking “Phishing” Emails Before They Reach Customers with Online Fraud Management Service EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://eval.veritas.com/
  19. 19. Corporate Espionage: Case Study EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://csrc.nist.gov/
  20. 20. Making Data Security a Top Priority for Leading IT Provider to the Airline Industry EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://eval.veritas.com/
  21. 21. Eliminating Spam In Its Tracks with Multi- Layered Solutions from Symantec EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://eval.veritas.com/mktginfo/
  22. 22. Captus Networks Helps Prevent Denial of Service Attacks with Intel® Network Adapters for Multi gigabit ScalabilitAdapters for Multi-gigabit Scalability EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.intel.com/network/
  23. 23. Bellingham+Stanley Implement Integrated Solution For Web And Email SecuritSecurity EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.insight.co.uk/files/
  24. 24. Australian Company Implements World’s Largest Biometric Voice ID Systemg y EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.searchsecurity.com.au/
  25. 25. SummarySummary This module has drawn various cases of information theft and security around the world It draws a picture of various practical applications that many companies have adopted to enhance security ofmany companies have adopted to enhance security of their assets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×