Active IT Securities



Network Admins are in charge of managing "local area communications networks (LAN) or wide area networks (WAN) for an organization." Network Administrator's responsibilities include monitoring "network security, installing new hardware and applications, monitoring software upgrades and daily activity, enforcing licensing agreements, developing a storage management program and providing for routine backups, not to mention ensuring that it is up and running all the time."

Counter-Hacking is "any anti-hacking measures that take place outside of the secured network or defended company. Counter-Hacking can be proactive, as in the case of Microsoft’s recent bounty for information leading to the arrest of hackers who target its software, or reactive as in the case of a hacker being tracked down and caught by a targeted company or individual. Also, counter-hacking can also include measures such as hacking the hacker or the spreading of a counter “good” worm in the attempt to thwart a worm attack."

Penetration testing involves an active analysis of current network, computer, and security systems to guage weakpoints that malicious, either internal or external, attackers would take advantage of. Best use of penetration testing is prior to an attack; it is a part of preventative maintenance. Penetration tests are valuable for several reasons: Determining the feasibility of a particular set of attack vectors, Identifying higher-risk vulnerabilities that result from a combination of lower-risk vulnerabilities exploited in a particular sequence, Identifying vulnerabilities that may be difficult or impossible to detect with automated network or application vulnerability scanning software, Assessing the magnitude of potential business and operational impacts of successful attacks,Testing the ability of network defenders to successfully detect and respond to the attacks,Providing evidence to support increased investments in security personnel and technology.

Digital Forensics involves the recovery and investigation of material found in digital devices. Digital forensics are used to probe, monitor, and otherwise determine where/why/how a computer crime was commited. This can be for the purpose of bettering a company's systems after an attack as well as to indite and expose the criminal(s).