Abstract: This first half of this paper details the tools and methodologies employed to determine the identity and physical location of a hacker who infiltrated a server and altered a Web page. The second half of this paper recreates the scenario in a laboratory environment, in order to instruct students on system administration, server security, network management, and basic data communications.
Keywords: Hands-on exercises, System administration, IIS security, Server configuration
Download this article: JISE - Volume 14 Number 1, Page 5.pdf
Recommended Citation: Sanders, Aaron D. (2003). Teaching Tip: Utilizing Simple Hacking Techniques to Teach System Security and Hacker Identification. Journal of Information Systems Education, 14(1), pp. 5-9.