Volume 14
Abstract: This first half of this paper details the tools and methodologies employed to determine the identity and physical location of a hacker who infiltrated a server and altered a Web page. The second half of this paper recreates the scenario in a laboratory environment, in order to instruct students on system administration, server security, network management, and basic data communications. Keywords: Hands-on exercises, System administration, IIS security, Server configuration Download this article: JISE - Volume 14 Number 1, Page 5.pdf Recommended Citation: Sanders, Aaron D. (2003). Teaching Tip: Utilizing Simple Hacking Techniques to Teach System Security and Hacker Identification. Journal of Information Systems Education, 14(1), 5-9. |