This first half of this paper details the tools and methodologies employed to determine the identity and physical location of a hacker who infiltrated a server and altered a Web page. The second half of this paper recreates the scenario in a laboratory environment, in order to instruct students on system administration, server security, network management, and basic data communications.
Sanders, Aaron D.
"Utilizing Simple Hacking Techniques to Teach System Security and Hacker Identification,"
Journal of Information Systems Education: Vol. 14
Available at: https://aisel.aisnet.org/jise/vol14/iss1/1
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.