Analyze the key tools available for scanning a network

Assignment Help Computer Engineering
Reference no: EM131368138

Assignment: Attack Methodology and Countermeasures

Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment.

Write a two to four+ page a paper in which you incorporate the following into your work:

1. Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

2. Analyze the key tools available for scanning a network. Recommend one scanning tool for a hacker and one scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.

3. Assess the overall importance of the five major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.

4. Suggest the key countermeasures that a security administrator could take in order to protect a company's assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.

5. Use no less than three quality resources in this assignment. Don't limit yourself to just three, if one needs more use more. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.
• Describe footprinting and passive information and competitive intelligence gathering.
• Explain the different types of scanning and scanning methodology.
• Describe enumeration and different techniques used for enumeration.
• Examine the functions and impact of malicious programs and their countermeasures.
• Use technology and information resources to research issues in ethical hacking.
• Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131368138

Questions Cloud

Write an essay on social change on one of given topics : Write the paper as a description of your "wildest dream." If you could have your dream job or dream position in a group of people or an organization, that could affect social change, what would it be and how would you see your role?
Historical timeline and predecessor assessment draft : This week, you will submit a draft of your Historical Timeline and Predecessor Assessment. This portion of the Course Project will include a historical timeline that diagrams at least three predecessors to the emergent technology and a written ass..
Addressing income inequity and poverty : An analysis of the impact that government policies addressing income inequity and poverty could have on labor demand or supply specifically for Apple Inc.
Discuss about the post given below : A psychological assessment report is created by psychology professionals to inform groups or individuals of the assessments appropriate for their current needs. This type of report also includes a summary of the services provided to these groups o..
Analyze the key tools available for scanning a network : CIS420- Analyze the key tools available for scanning a network. Recommend one scanning tool for a hacker and one scanning tool for a security administrator that you believe provide the greatest protection for a network.
How you plan to fund the idea : CIS8011 - Assessment item Case Based Learning Activity. You are a start up with a digital idea. Write an essay to outline your idea, its value proposition, revenue sources, cost structure, relevant customer and key activities and resources involved
Describe jean piaget stages and theories of development : Who is Jean Piaget? Define and describe his stages and theories of development.
Draw a block diagram of the system : Write synthesizable VHDL code that will generate the given waveform (W). Use a single process. Assume that a clock with a 1 s period is available as an input.
Why was original too time consuming : Write detailed explanation of why design was not implemented. For example, if your design was too ambitious and you did't have time to implement it completely, what did you do instead, and why was original too time consuming?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd