Professional Documents
Culture Documents
EC Council
EC-Council
Mod le XXXXI
Module
Data Leakage Penetration
T ti
Testing
Information
Vulnerability
External
Gathering
Analysis
Penetration Testing
Fi
Firewall
ll
Penetration Testing
Router and
Switches
Internal
Network
Penetration Testing
Penetration Testing
Wireless
Network
Denial of
Service
Penetration Testing
Penetration Testing
IDS
Penetration Testing
Contd
Application
Penetration Testing
EC-Council
Social
Engineering
Password
Cracking
Penetration Testing
Penetration Testing
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Physical
S
Security
i
Database
P
Penetration
i testing
i
VoIP
P
Penetration
i T
Testing
i
War Dialing
VPN
Penetration Testing
Penetration Testing
Virus and
Vi
d
Trojan
Detection
Log
Management
Penetration Testing
File Integrity
Checking
End Here
Data Leakage
Penetration Testing
EC-Council
Security
Patches
Penetration Testing
Email Security
Penetration Testingg
Telecommunication
And Broadband
Communication
Penetration Testing
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Data Leakage
Loss of private and sensitive data affects the financial
condition of an organization, and damages its reputation.
Many companies are worried about data leakage through
email.
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Source: http://www.networksunlimited.com
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
What to Protect
Employees information such as names, addresses, social security numbers, and other identity-related
information
Marketing and new product plans
Corporate strategies
Target markets and prospect information
Usual business methods
Product designs,
designs research
research, and costs
Alliance and contract arrangements: delivery, pricing, and terms
Customer and supplier information
Staffing, operations, and wage/salary
Credit records or credit union account information
Trade secrets and intellectual property
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Use the slot manager which creates slot information record for each
memory slot.
Slot manager identifies all the memory resources and creates a slot
resource table.
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
The image cannot be display ed. Your computer may not hav e enough memory to open the image, or the image may hav e been corrupted. Restart y our computer, and then open the file again. If the red x still appears, y ou may hav e to delete the image and then insert it again.
Go to My Computer
PropertiesHardwareDevi
ce Manager
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Reconnex's iGuard
Steganos Security Suite
Data Protection Software
FolderAccess
LockFolder
EC-Council
Private InfoKeeper
QwikSecure File Protection
System
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
Summary
Loss of private and sensitive data affects the financial condition and
reputation of the organization.
organization
Employees information such as names, addresses, and social security
p
numbers must be protected.
Doors of data leakage are USB, FTP ports, Bluetooth, email attachment,
firewire, memory slots, spyware, and Trojans.
Check physical availability of USB devices and try to enable them.
Check whether Bluetooth, firewire, and FTP ports are enabled.
Check whether anti-spyware and anti-Trojans are enabled.
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited
EC-Council
Copyright by EC-Council
All Rights reserved. Reproduction is strictly prohibited