Professional Documents
Culture Documents
Derivation of Framework and Blueprint For Hacking Countermeasure
Derivation of Framework and Blueprint For Hacking Countermeasure
Derivation of Framework and Blueprint For Hacking Countermeasure
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 5, September October 2013 ISSN 2278-6856
2. LITERATURE REVIEW
Despite of the advancesindefense in depth (DID) security systems, information security beaches increase and become more sophisticated that hackers have been successful in their attack missions over the years causing damages, steeling information, corrupting data and threatening national and international security, which led security experts to question the reliability and effectiveness of current security systems against hacking attacks [152, 549, 551-559]. Researches like [86], [91], [179], [296], [327], [544] brought viable hints and recommendations for defense in breadth (DIB) approaches, but not standalone DIB systems as such. Community Cyber Security Maturity Model (CCSMM) [560], on the other hand, was initially designed for communities. However, again as this model works perfect for awareness programs, the short limitation with this solution that it does not set clear instructions for defense in depth, nor hiding and deception techniques, but instead, it requests community to have in place. Therefore, to overcome the limitations in the current defense-in-depth systems,we adopted the nine hacking processes from [15], and then, for building the hacking countermeasurefor every hacking process, we applied the concept and recommendations of deception and hiding from [78], [137], [140], [141], [167], [247], [253], [259], [274-278], [375], [497], [568], [593], [612], and made the best use of enhanced defense-in-depth from [1-650]. As part of defense in breadth development, we adapted the Community Cyber Security Maturity Model (CCSMM) [560] to implement a global cyber security program. In this scenario, countries consist of individual communities of various public and private organizations/agencies; each community should be working toward improving their own security posture using enhanced defense in depth and establishing hiding and deception techniques, while countries can provide high level of leadership, awareness, assistance and guidance for communities on all framework levels, thereby enforcing consistency and event handling within the country itself and across the world, fulfilling defense in breadth requirements. This concept was enhancedwith recommendations from [86], [91], [179], [296], [327], [544].We also complemented the work with recommendations for incidents management and event handling from [78], [142-146], [211], [361], [362], [363], [457], [532], [544], [560].
Keywords: Hacking processes, defense in depth, defense in breadth, deception and hiding, framework for hacking countermeasure.
1. INTRODUCTION
The real challenge in cyber world is to be able to preserve confidentiality, integrity and availability of online services and protect it from hackers prying eyes. The objective of this research is to design and build hacking countermeasure framework and blueprint for hackers attack prevention, taking into consideration the drawbacks and limitations of the existing solutions and providing effective non-intrusive security with full blocking capabilities. This requirement is achieved by first studying and analyzing hacking activities, working out hacking processes and setting related risks, then acquiring the latest security recommendationscovering Defense-In-Depth, DefenseIn-Breadth, and Hiding and Deception techniques, thirdly, checking compliance with selected information security standards, and finally set auditing for the final hacking countermeasure that is verified and validated using questionnaires and interview surveys at the various research stages.
Page 66
Figure 1 Sample research work sheets i) [26], [27], [38], [47], [48], [49], [74], [75], [76], [97],[103], [121], [129], [137], [138], [151], [187], [221], [233], [235], [247-274], [507], [508], [510], [561],[565], [574], [585-588]. ii) Scanning: [15], [16], [17], [19], [24], [26], [27], [48], [49], [137], [138], [161], [175], [301-312], [463], [529], [581], [638], [640]. iii) Enumeration: [15], [16], [17], [19], [20], [23-28], [30], [48], [49], [58], [127], [137], [138], [158], [159], [163], [253], [294], [297], [313-321], [413], [503], [507], [508], [510], [513], [517], [571], [613-615], [620], [644], [649], [650]. iv) Gaining access: [6], [10], [13-29], [37], [43], [48], [49], [77], [78], [82], [134], [135], [137], [138], [183], [253], [322-357], [366-373], [376-445], [501-508], [510], [511], [513], [518], [520], [522-526], [528], [530], [532-540], [542], [548], [555], [556], [562], Volume 2, Issue 5 September October 2013
Table 1:Summary result for the hacking countermeasure framework and blueprint questionnaire survey. Summary result for the Hacking Countermeasure Framework and blueprint questionnaire survey Comprehensive Results Percentages Part A relates mainly to the framework and addresses the objective of designing a framework for hacking countermeasures that accommodates enhanced Defense-in-Depth (DID), Defense-in-Breadth (DIB), hiding and deception techniques, incident management and even handling, hacking risks, auditing and penetration testing and compliancy with infosec standards. a1. After going through the hacking countermeasure framework and the Yes 73% blueprint, do you find reverse engineering hacking techniques that is No 0% directing the countermeasures to hacking activities will certainly provide Maybe 20% more effective solutions against hacking to your organization? Don't know 7% a2. Do you find the horizontal nine hacking processes and the vertical solution domains presented in the framework fit for the purpose of nonintrusive, full hacking blocking capabilities in your organization? Yes No Maybe Don't know 67% 0% 27% 7% Page 68
Yes 87% No 0% Maybe 7% Don't know 7% Part C relates to the blueprint, and addresses the objective of developing a framework blueprint for hacking prevention, providing effective non-intrusive security with full blocking capabilities, and filling the hacking countermeasure security gap in most current practice models, by incorporating enhanced Defense-in-Depth (DID), Defense-in-Breadth (DIB), hiding and deception techniques, incident management and even handling, security risks, auditing and penetration testing and compliancy with infosec standards c1. Do you support that the provided defense in breadth in the blueprint Yes 80% closes the security gap that is there in the current defense-in-depth solutions, No 7% especially those related to human factor effect, and will certainly improve Maybe 13% hacking countermeasures in your organization? Don't know 0% c2. Would you recommend the provided incident management and event handling in the blueprint to improve hacking countermeasures in your organization? Yes No Maybe Don't know Yes No Maybe Don't know 73% 0% 27% 0% 80% 0% 7% 13%
c3. Do you find the provided auditing and penetration testing in the blueprint useful and will certainly improve hacking countermeasures in your organization?
c4. Would you recommend the blueprint to provide a proactive security Yes 80% solution that is able to protect information systems by continuously guarding No 0% against hacking behaviors, and to strengthen and ease compliances Maybe 13% requirements in your organization? Don't know 7% Part D provides recommendations for general input to the research and future development d1. What are your challenges to enforce this hacking countermeasures (1) The costs in terms of solution, and enrich future developments? performance. It is practical to be implemented in a large scale networks with limited Volume 2, Issue 5 September October 2013 Page 69
To design a framewor k for hacking counterm easures that accommo dates enhanced Defensein-Depth (DID), DefenseinBreadth (DIB), hiding and deception techniqu es, incident manage ment and even handling, hacking risks, auditing and penetrati on testing and complian cy with infosec standards . To develop a framewor k blueprint for hacking preventio n,
a1. After going through the hacking countermeasure framework and the blueprint, do you find reverse engineering hacking techniques that is directing the countermeasures to hacking activities will certainly provide more effective solutions against hacking to your organization? a2. Do you find the horizontal nine hacking processes and the vertical solution domains presented in the framework fit for the purpose of non-intrusive, full hacking blocking capabilities in your organization?
a3. Would you agree to the statement which says that this framework is the first of its kind in its approach, and will provide guidelines for future researches in the field of hacking countermeasures?
b1. Are the provided hacking risks in the blueprint helpful in promoting infosec awareness including human factor effect, and will certainly improve hacking countermeasures in your organization? b2. Does the provided
73% of surveyed sample find The survey questionnaire reverse engineering hacking and interviews were techniques that is directing directed to IT managers, the countermeasures to infosec specialists and hacking activities will experts to verify and certainly provide more validate the effectiveness effective solutions against and reliability of the hacking to their research outcome, and organizations, compared to nil result analysis validates answered with No, 20% the framework and the maybe and 7% dont know blueprint, and showed that the objectives have People who find the been fully met, as horizontal nine hacking follows: processes and the vertical solution domains presented in 1. Sets major guidelines for the framework fit for the future researches in the purpose of non-intrusive, full field of hacking hacking blocking capabilities countermeasures. in their organization is 67%, 2. Sets guidelines for while no one answered with information security No; the rest went for the specialists considering Maybe with 27%, and the hacking countermeasures Dont know with 7%. approaches to their 7% of the surveyed sample information systems disagree to the statement security designs. which says that this 3. Designing a proactive framework is the first of its security solution that is kind in its approach, and will able to protect provide guidelines for future information systems by researches in the field of continuously guarding hacking countermeasures, against hacking while 40% agree and 33% behaviors, by providing said maybe and 20% dont best solutions for hacking know processes risks, enhanced Defense-In-Depth (DID), Defense-In-Breadth (DIB), hiding and deception, auditing and penetration testing, incident management and event handling, as b1 to b3 show that there is no well as compliance with single response with No, infosec standards. and only 7% said Dont know on all three; in contrast, 87% of the sample surveyed are approving that the provided hacking risks in the blueprint helpful in promoting infosec awareness Page 71
10
providin g effective nonintrusive security with full blocking capabiliti es, and fill the hacking counterm easure security gap in most current practice models, by incorpora ting enhanced Defensein-Depth (DID), DefenseinBreadth (DIB), hiding and deception techniqu es, incident manage ment and even handling, security risks, auditing and penetrati on testing and complian cy with infosec standards .
enhanced defense in depth in the blueprint set guidelines for information security specialists considering hacking countermeasures approaches to their information systems security designs, and would you recommend it to improve hacking countermeasures in your organization? b3. Do you find the provided hiding and deception techniques in the blueprint effective against hacking activities, and you would recommend it to improve hacking countermeasures in your organization?
c1. Do you support that the provided defense in breadth in the blueprint closes the security gap that is there in the current defense-in-depth solutions, especially those related to human factor effect, and will certainly improve hacking countermeasures in your organization? c2. Would you recommend the provided incident management and event handling in the blueprint to improve hacking countermeasures in your organization? c3. Do you find the provided auditing and penetration testing in the blueprint useful and will certainly improve hacking countermeasures in your organization? c4. Would you recommend the blueprint to provide a proactive security solution that is able to protect information systems by continuously guarding against hacking behaviors,
including human factor effect, and will certainly improve hacking countermeasures in their organizations; 80% approved that theprovided enhanced defense in depth in the blueprint set guidelines for information security specialists considering hacking countermeasures approaches to their information systems security designs, and would recommend it to improve hacking countermeasures in their organizations; and also 87% find the provided hiding and deception techniques in the blueprint effective against hacking activities, and would recommend it to improve hacking countermeasures in their organization None of the questions (c1 to c4) got No answer, except one for question c1; on the other hand, 80% of the answers responded with Yes to questions c1, c3 and c4, and 73% for c2, which makes 78.25% in addition to 15% Maybe, compared to only 1.75% negative No answer and 5% Dont know on this section
Page 72
General input to the research and future development; which contains the final question that requests the evaluator to give challenges to enforce the evaluated hacking countermeasures solution and enrich future developments
and to strengthen and ease compliances requirements in your organization? d1. What are your challenges to enforce this hacking countermeasures solution, and enrich future developments?
(1) Costs in terms of These issues have been fully performance,and its met in the research practicality to be implemented in a large scale networks with limited resources in some areas. (2) Performance in terms of time delay, and its practicality for mission critical services. (3) Countermeasures may result in conflicts within different applications and services. (4) Resources include the manpower, funds, equipment's, infrastructure, do organizations have enough resources to enforce such solution. (5) The skill level of the teams responsible for carrying out different proactive and reactive activities, the skills requirements and training program needed to carry out each task. (6) People resistance to change. (7) Implementation required more time than other industrial approved solution. the fully meeting of all objectives requirements, as well as the full validation and approval of the Hacking Countermeasure Framework (HCF) and the blueprint; and this is finally grants a positive answer to the statement of the problem "Can a hacking countermeasure framework provide more effective solutions against hacking attacks than the current infosec practice models?
4.3Interviews survey results and analysis Table 3 below gives a comparative summary outcome of the interviews, and maps them to the interview survey questions, while in the same time grouping them functionally under the desired objectives; the remarks column in Table 3 gives detailed outcome information of this mapping, and the achievement column clearly shows
Table 3: Results and analysis for the interviews survey for thehacking countermeasure framework and blueprint Results and analysis for the Hacking Countermeasure Framework and blueprint interviews survey
Questionnaire Interview 1 Interview 2 Interview 3 Remarks Achievements
Part A relates mainly to the framework and addresses the objective of designing a framework for hacking countermeasures that accommodates enhanced Defense-in-Depth (DID), Defense-in-Breadth (DIB), hiding and deception techniques, incident management and even handling, hacking risks, auditing and penetration testing and compliancy with infosec standards.
Page 73
a1. After going through the hacking countermeasure framework and the blueprint, do you find reverse engineering hacking techniques that is directing the countermeasures to hacking activities will certainly provide more effective solutions against hacking to your organization? a2. Do you find the horizontal nine hacking processes and the vertical solution domains presented in the framework fit for the purpose of non-intrusive, full hacking blocking capabilities in your organization?
The proposed Reverse Engineering Technique can improve the solutions against hacking to organization.
The framework and the blueprint develop a logical structure of security elements and processes which help to sense and stop the hacking attack.
Yes
The provided reverse engineering hacking techniques will certainly provide more effective solutions against hacking.
The research fulfills the requiremen t of first objective, and the framework is validated.
This framework can offers customized, behaviorbased security for each protected application.
The framework draws high concentration on security vertical domains which certainly enhance the hacking blocking capabilities if deployed in well structured environment
Yes
The horizontal nine hacking processes and the vertical solution domains presented in the framework fit for the purpose of nonintrusive, full hacking blocking capabilities.
a3. Would you agree to the statement which says that this framework is the first of its kind in its approach, and will provide guidelines for future researches in the field of hacking countermeasures?
To my Yes Maybe The interviewers knowledge, it agree by 83.3% that is first of its this framework is kind. This the first of its kind framework in its approach, and may provide will provide guidelines for guidelines for future future researches in the researches field of hacking due to threats countermeasures. interpretation skills, tools and techniques to effectively assess the threat to organization security. Part B relates to the blueprint, and addresses the objective of To develop a framework blueprint for hacking prevention, providing effective non-intrusive security with full blocking capabilities, and filling the hacking countermeasure security gap in most current practice models, by incorporating enhanced Defense-in-Depth (DID), Defense-in-Breadth (DIB), hiding and deception techniques, incident management and even handling, security risks, auditing and penetration testing and compliancy with infosec standards.
Page 74
b1. Are the provided hacking risks in the blueprint helpful in promoting infosec awareness including human factor effect, and will certainly improve hacking countermeasures in your organization?
One of the best ways to make sure employees will not make costly errors in regard to information security is to institute organization wide securityawareness initiatives. Actually, there is no effective way to protect against a Social Engineering attack because no matter what controls are implemented, there is always that human factor which influences the behavior of an individual. The proposed method is helpful in promoting information security awareness to an extent.
Since the blueprint has been developed and classified in very clear way, I think yes it will do.
Yes
The provided hacking risks in the blueprint are helpful in promoting infosec awareness including human factor effect, and will certainly improve hacking countermeasures.
This fulfills the requiremen t of meeting the objective concerning setting guidelines for information security specialists considering hacking countermea sures approaches to their information systems security designs; and it validates the blueprint.
Page 75
b2. Does the provided enhanced defense in depth in the blueprint set guidelines for information security specialists considering hacking countermeasures approaches to their information systems security designs, and would you recommend it to improve hacking countermeasures in your organization?
To ensure complete security of an organization from all kinds of internal and external factors, the IS Experts must have deep understanding of the techniques that can be used by an attacker and the countermeasures to reduce the likelihood of success of the attack. Of course hacking countermeasu re approach can be considered for Information systems security designs and based on its success, it can be promoted.
Yes I do
Yes
The provided enhanced defense in depth in the blueprint set guidelines for information security specialists considering hacking countermeasures approaches to their information systems security designs, and it is recommended to improve hacking countermeasures in organizations.
b3. Do you find the provided hiding and deception techniques in the blueprint effective against hacking activities, and you would recommend it to improve hacking countermeasures in your organization?
The Yes I do Yes The provided hiding framework and deception includes a set techniques in the of processes, blueprint are principles and effective against techniques. hacking activities, The hiding and it is and deception recommended to techniques in improve hacking the blueprint countermeasures in are workable organizations. against hacking activities and would like to implement in our organization. Part C relates to the blueprint, and addresses the objective of developing a framework blueprint for hacking Page 76
prevention, providing effective non-intrusive security with full blocking capabilities, and filling the hacking countermeasure security gap in most current practice models, by incorporating enhanced Defense-in-Depth (DID), Defense-in-Breadth (DIB), hiding and deception techniques, incident management and even handling, security risks, auditing and penetration testing and compliancy with infosec standards c1. Do you support that Humans are Yes I do Yes The provided This the provided defense in consistently defense in breadth in concludes breadth in the blueprint referred to as the blueprint closes meeting all closes the security gap the weakest the security gap that objectives that is there in the current link in is there in the requiremen defense-in-depth security. An current defense-ints, and solutions, especially those exclusive depth solutions, approves related to human factor focus on the especially those the effect, and will certainly technical related to human blueprint. improve hacking aspects of factor effect, and countermeasures in your security, will certainly organization? without due improve hacking consideration countermeasures. of how the human interacts with the system, is clearly inadequate and I feel that the proposed method will improve hacking countermeasu res in my organization. c2. Would you recommend the provided incident management and event handling in the blueprint to improve hacking countermeasures in your organization? The provided incident management has the ability to provide management of information security events and incidents and I will recommend it. Yes I do Yes The provided incident management and event handling in the blueprint improves hacking countermeasures.
Page 77
c3. Do you find the provided auditing and penetration testing in the blueprint useful and will certainly improve hacking countermeasures in your organization?
Auditing and Penetration tests applied in this framework are valuable for several reasons: 1) Identifying higher-risk vulnerabilities that result from a combination of lower-risk vulnerabilities exploited in a particular sequence. 2) Identifying vulnerabilities that may be difficult or impossible to detect with automated network or application vulnerability scanning software. 3) Assessing the magnitude of potential business and operational impacts of successful attacks. 4) Testing the ability of network defenders to successfully detect and respond to the attacks.
Yes I do
Yes
The provided auditing and penetration testing in the blueprint and appendices B and F are useful and will certainly improve hacking countermeasures.
Page 78
c4. Would you recommend the blueprint to provide a proactive security solution that is able to protect information systems by continuously guarding against hacking behaviors, and to strengthen and ease compliances requirements in your organization?
Todays Yes I do Yes The interviewers Internet recommend the requires a blueprint to provide whole new a proactive security approach to solution that is able security. to protect Almost information systems everything is by continuously interconnecte guarding against d and taking hacking behaviors, place in real and to strengthen time. And and ease that includes compliances the threats. requirements Effective security software must be alert at all times for new, ever - more devious malware. New types of threats require new types of protection. It always prefers to guard against hacking behaviors. Part D provides recommendations for general input to the research and future development d1. What are your Acceptance As this solution Mostly they 1) Security challenges to enforce this by has been mapped are related awareness. hacking countermeasures Management with with security 2) Social solution, and enrich and the International awareness, engineering. future developments? employee standards and social 3) Lack of skills set. behavior. best practices, I engineering, 4) Resistance to think challenges lack of skills change. are limited such set, resistance 5) Trust and as: to change, confidentiality issues 6) Implementation 1) Lack of trust and Volume 2, Issue 5 September October 2013
Page 79
experience and exposure to some security domain. 2) Implementation required extra time for meeting expected outcome
4.4Evaluation summary Questionnaire and interviews surveys were conducted and analyzed for evaluating this research by verifying meeting the objectives, and assure effectiveness and reliability of the outcome framework and blueprint; this was done via a questionnaire survey that is distributed to selected IT managers and infosec specialists, in addition to interview surveys with the same questionnaire with senior information security experts from public and private sectors, military, universities, and CERT, and presented the major findings in this research with respect to the technical requirements, and mapped them with the evaluation result, which shows that the technical requirements and the scope of work were fully achieved in this research. This concludes the validation and meeting of the research objectives and approves the hacking countermeasure framework and blueprint introduced with all its contents including hacking processes risks, enhanced Defense-In-Depth (DID), Defense-In-Breadth (DIB), hiding and deception, auditing and penetration testing, incident management and event handling, as well as compliance with infosec standards.
Finally it is clear that this is the answer too for the statement of the problem "Can a hacking countermeasure framework provide more effective solutions against hacking attacks than the current infosec practice models?", which is Yes as said in the questionnaire and interview surveys.
5. DISCUSSION
This section discusses the major findings of this research as a result of the research evaluation,and mapsitto the technical requirements that were set for the As-To-Be framework and blueprint development, and used to direct the countermeasures to the hacking processes, whichderived hacking processes risks, enhanced DefenseIn-Depth (DID), Defense-In-Breadth (DIB), hiding and deception, auditing and penetration testing, incident management and event handling, as well as compliance with infosec standards; the summary of this mapping and the discussion is given in Table 4.
Table 4: Mapping of the hacking countermeasures technical requirement to research findings Hacking countermeasures technical requirement versus research findings Technical Requirements Applying reverse engineering hacking techniques by directing the countermeasures to hacking activities Survey questions a1. After going through the hacking countermeasure framework and the blueprint, do you find reverse engineering hacking techniques that is directing the countermeasures to hacking activities will certainly provide more effective solutions against hacking to your organization? a2. Do you find the horizontal nine hacking processes and the vertical solution domains presented in the framework fit for the purpose of non-intrusive, full hacking blocking capabilities in your organization? Achieved. 73% of surveyed sample find reverse engineering hacking techniques that is directing the countermeasures to hacking activities will certainly provide more effective solutions against hacking to their organizations, compared to nil answered with No, 20% maybe and 7% dont know Findings
Achieved. People who find the horizontal nine hacking processes and the vertical solution domains presented in the framework fit for the purpose of non-intrusive, full hacking blocking capabilities in their organization is 67%, while no one answered with No; the rest went for the Maybe with 27%, and the Dont know with 7%. Page 80
Provision of incident management and event handling Provision of auditing and penetration testing
a3. Would you agree to the Achieved. statement which says that this framework is the first of its kind in 7% of the surveyed sample disagree to the statement which its approach, and will provide says that this framework is the first of its kind in its approach, guidelines for future researches in and will provide guidelines for future researches in the field the field of hacking of hacking countermeasures, while 40% agree and 33% said countermeasures? maybe and 20% dont know, in addition, the interviewers agree by 83.3% b1. Are the provided hacking risks Achieved in the blueprint helpful in promoting infosec awareness b1 show that there is no single response with No, and only including human factor effect, and 7% said Dont know; compared to 87% of the sample will certainly improve hacking surveyed are approving that the provided hacking risks in the countermeasures in your blueprint helpful in promoting infosec awareness including organization? human factor effect, and will certainly improve hacking countermeasures in their organizations. b2. Does the provided enhanced Achieved defense in depth in the blueprint set guidelines for information security b2 show that there is no single response with No, and only specialists considering hacking 7% said Dont know; in contrast, 80% approved that countermeasures approaches to theprovided enhanced defense in depth in the blueprint set their information systems security guidelines for information security specialists considering designs, and would you recommend hacking countermeasures approaches to their information it to improve hacking systems security designs, and would recommend it to improve countermeasures in your hacking countermeasures in their organizations. organization? b3. Do you find the provided Achieved hiding and deception techniques in the blueprint effective against b3 show that there is no single response with No, and only hacking activities, and you would 7% said Dont know; on the other hand 87% find the recommend it to improve hacking provided hiding and deception techniques in the blueprint countermeasures in your effective against hacking activities, and would recommend it organization? to improve hacking countermeasures in their organization. c1. Do you support that the Achieved provided defense in breadth in the blueprint closes the security gap c1 got only one No answers; on the other hand, 80% of the that is there in the current defense- answers responded with Yes to the questions. in-depth solutions, especially those related to human factor effect, and will certainly improve hacking countermeasures in your organization? c2. Would you recommend the Achieved provided incident management and event handling in the blueprint to c2 got none No answers; and 73% of the answers responded improve hacking countermeasures with Yes, in addition to 27% Maybe. in your organization? c3. Do you find the provided Achieved auditing and penetration testing in the blueprint useful and will c3 got none No answers, and 80% of the answers responded certainly improve hacking with Yes to questions . countermeasures in your organization? Page 81
6. Conclusion
This research develops hacking countermeasure framework and blueprint by finding solutions for the actual hacking processes using defense-in-depth, defense-in-breadth, deception and hiding, incident management and event handling, in addition to hacking risk assessment, auditing and compliance. The developed hacking countermeasure framework has four main domain components, these are the risk assessment, the hacking countermeasures, auditing and penetration testing and the forth is compliances with information security standards; from the framework, a blueprint was also developedwhich provides solutions for all the hacking processes. Both the framework and the blueprintwerecontinuously validated successfully throughout the research via questionnaires and interviews surveys. Finally, we hope that this work will contribute in providing more effective future solutions against hacking attacks.
REFERENCES
[1] Brancik, Kenneth C. Insider computer Fraud.Auerbach Publications. 2008. [2] Guido, Schryen. Anti Spam Measures.Springer. 2007. [3] Spivey, Mark D. Practical Hacking Techniques and Countermeasures.Auerbach Publications (USA).2007. [4] Paul Nelson, Amelia Philips, Christopher Steuart. Guide to computer forensics and investigations. Course technology (USA). 2010. [5] Eoghan Casey. Digital evidence and computer crime, 3rd edition.Elsevier (USA). 2011. [6] Anderson, R. Security Engineering.2ndedition.Wiley. 2008. [7] David Maynor, Lance James, Spammer-X, Tony Bradley, Brad Haines, Brain Baskin, Anand Das, HershBhargava, Jeremy Faircloth, Craig Edwards, Michael Gregg and Ron Bandes. Emerging Threats Analysis.Syngress Force. 2006. [8] Christopher M. King, Curtis E. Dalton and T. Ertem Osmanoglu. Security architecture.ASA Press. 2001. [9] Mollin, Richard A. Codes.Chapman& Hall /CRC. 2005. Volume 2, Issue 5 September October 2013
[10] Smith, S. and Marchesini, J. The Craft of System Security. Addison Wesley. 2008. [11] Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson and Frank Buschmann. Security Patterns.Wiley. 2006. [12] Swenson, C. Modern Cryptanalysis Techniques for Advanced Code Breaking. 1st edition. Wiley Publishing (USA).2008 [13] Bryan Burns, Dave Killion, Nicolas Beauchesne and Eric Moret. Security Power Tools.1stedition.OReillyMedia(USA).2007. [14] Gregg, M. Build Your Own Security Lab. 1st edition. Wiley Publishing (USA). 2008. [15] McClure, S. Scambray, J. Kurtz G. Hacking Exposed Network Security Secrets and Solutions. 7th edition. McGraw-Hill/ Osborne (USA). 2012. [16] Mike Shema, Chris Davis and David Cowen. AntiHacker Tool Kit.3rdedition.McGraw-Hill/ Osborne(USA).2006. [17] Fadia, A.The Unofficial Guide to Ethical Hacking.2ndedition.Thomson Course Technology(Canada).2006. [18] Department of Defense, Cliff Wang, Steven King, Ralph Wachter, Robert Herklotz, Chris Arney, Gary Toth, David Hislop, Sharon Heise and Todd Combs. Department of Defense Sponsored. Information Security Research. 1st edition. Wiley Publishing(USA). 2007 [19] Churchhouse, R.Codes and Ciphers. 1stedition.CambridgeUniversityPress(USA). 2002 [20] Erickson, J.Hacking The Art of Exploitation. 2nd edition. William Pollock (USA). 2008 [21] Cox, K. and Greg, C. Managing Security with Snort and IDs Tools. 1stedition.OReilly Media (USA). 2004 [22] Kanneganti, R. and Chodavarapu, P.SOA Security.1st edition. Manning Publications CO(USA). 2008 [23] Moskowitz, J. Group Policy Fundamentals, Security, and Troubleshooting.1st edition. Wiley Publishing(Canada). 2008 [24] Seacord, R C.The Cert C Secure Coding Standard.1st edition. Addison Wesley(USA).2007 [25] Marty, R.Applied Security Visualization.1st edition. Addison Wesley(USA). 2008 Page 82
Author:
Mr. Said K Al-Wahaibi is a researcher in the field of computer security and networking, where he conducts courses, prepares studies and supervises projects on the subject for many organizations. He received his BE degree in electronic engineering from the University of Reading (England) in 1990, and MSc degree in telecommunications engineering from the National University of Sciences and Technology (Pakistan) in 1999. Said has a vast practical experience in telecommunications, networking, projects management and information security (in which alone he holds 7 infosec license), and received many national and international rewards for his activities and participation in the field. Dr. Norafida Ithnin is a senior lecturer at Universiti Teknologi Malaysia. She received her BSc degree in Computer Science from Universiti Teknologi Malaysia in 1995, her MSc degree in Information Technology (Computer Science) from University Kebangsaan Malaysia in 1998 and her PHD degree in Computation from UMIST, Manchester in 2004. Her primary research interests are in security management, security risk and analysis and security policy and standard. She is the author and co-author for many journal and conference proceedings at national and international levels.
Page 108