Reference no: EM131368138
Assignment: Attack Methodology and Countermeasures
Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment.
Write a two to four+ page a paper in which you incorporate the following into your work:
1. Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.
2. Analyze the key tools available for scanning a network. Recommend one scanning tool for a hacker and one scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.
3. Assess the overall importance of the five major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.
4. Suggest the key countermeasures that a security administrator could take in order to protect a company's assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.
5. Use no less than three quality resources in this assignment. Don't limit yourself to just three, if one needs more use more. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.
• Describe footprinting and passive information and competitive intelligence gathering.
• Explain the different types of scanning and scanning methodology.
• Describe enumeration and different techniques used for enumeration.
• Examine the functions and impact of malicious programs and their countermeasures.
• Use technology and information resources to research issues in ethical hacking.
• Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.
Write an essay on social change on one of given topics
: Write the paper as a description of your "wildest dream." If you could have your dream job or dream position in a group of people or an organization, that could affect social change, what would it be and how would you see your role?
|
Historical timeline and predecessor assessment draft
: This week, you will submit a draft of your Historical Timeline and Predecessor Assessment. This portion of the Course Project will include a historical timeline that diagrams at least three predecessors to the emergent technology and a written ass..
|
Addressing income inequity and poverty
: An analysis of the impact that government policies addressing income inequity and poverty could have on labor demand or supply specifically for Apple Inc.
|
Discuss about the post given below
: A psychological assessment report is created by psychology professionals to inform groups or individuals of the assessments appropriate for their current needs. This type of report also includes a summary of the services provided to these groups o..
|
Analyze the key tools available for scanning a network
: CIS420- Analyze the key tools available for scanning a network. Recommend one scanning tool for a hacker and one scanning tool for a security administrator that you believe provide the greatest protection for a network.
|
How you plan to fund the idea
: CIS8011 - Assessment item Case Based Learning Activity. You are a start up with a digital idea. Write an essay to outline your idea, its value proposition, revenue sources, cost structure, relevant customer and key activities and resources involved
|
Describe jean piaget stages and theories of development
: Who is Jean Piaget? Define and describe his stages and theories of development.
|
Draw a block diagram of the system
: Write synthesizable VHDL code that will generate the given waveform (W). Use a single process. Assume that a clock with a 1 s period is available as an input.
|
Why was original too time consuming
: Write detailed explanation of why design was not implemented. For example, if your design was too ambitious and you did't have time to implement it completely, what did you do instead, and why was original too time consuming?
|