Share this on:
About this iReport
  • Not verified by CNN

  • Click to view johncoops23's profile
    Posted July 5, 2014 by
    This iReport is part of an assignment:
    Tech talk

    Tech Talk: Protecting And Safeguarding Your Network’s System


    There are some things that you need to focus on and prioritize if you are a website owner. And if you are an e-commerce merchant, you will certainly get paid y electronically on a daily basis. As such, one of your main jobs is to make sure that you always keep your customers’ credit card information and other sensitive data kept safe and secure. This is very important to do and prioritize since you want have a clean and solid reputation as an online business owner and of course, this is a way for you to retain and increase your pool of repeat and loyal paying customers.


    Since your day to day business depends greatly on your website, you are also vulnerable to cyber intrusions, attacks or hacking. And because you also don’t want any sensitive data from your part stolen or accessed, you need to make sure that your system is sufficiently protected and safe. You can do this by undergoing a network penetration test.


    Penetration testing refers to the process of checking or “intruding into” your website and systems to ensure that it is sufficiently protected. The process is also usually referred to as “ethical hacking” since before penetration (or “pen”) testers try to test or hack into your website, you have to agree to it first.
    This test is usually carried out by trained and expert penetration testers since they have access to different type of penetration testing tools.


    Commonly Used Network Penetration Testing Tools


    The following are some of the most popular security testing tools which penetration testers regularly use for the testing process:


    Acunetix. This company offers both free and paid testing tools. Acunetix’ tests and pinpoints the different types of web vulnerabilities, such as SQL Injection and Cross Site scripting. Acunetix produces detailed reports that which correctly determines a network’s security issues and vulnerabilities.


    Nmap. This tool is one of the most popular tools used by penetration testers. Nmap allows fast host discovery, port mapping, service/operating system identification and enumeration which are all used in the collection of all possible basic and vital information about the network and any live hosts.


    Cain & Abel. This testing tool is mainly used for password recovery. Cain & Abel permits a penetration tester to recover various types of passwords to the network. This tool can also crack encrypted passwords. This testing tool helps greatly in pinpointing the security weaknesses in a protocol’s standards but it does not exploit any software vulnerabilities or holes.

    What do you think of this story?

    Select one of the options below. Your feedback will help tell CNN producers what to do with this iReport. If you'd like, you can explain your choice in the comments below.
    Be and editor! Choose an option below:
      Awesome! Put this on TV! Almost! Needs work. This submission violates iReport's community guidelines.


    Log in to comment

    iReport welcomes a lively discussion, so comments on iReports are not pre-screened before they post. See the iReport community guidelines for details about content that is not welcome on iReport.

    Add your Story Add your Story