Describes the organization you are targeting

Assignment Help Management Information Sys
Reference no: EM131287524

You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet provides a wealth of information on seemingly any topic and a means of connecting information. Because of this, hackers can create significant dossiers on potential targets. As an IT professional, you will want to be familiar with your company's Internet footprint and, when possible, reduce this attack surface by removing or securing any information that has not been officially released by the company.

In this lab assignment, you will don the black hat again and perform data gathering and footprinting on an organization of your choice.
To prepare for this Assignment, read the Assignment 1 notes in the Unit 3 Notes, which is located in this week's Learning Resources, before proceeding.
read the "Ethics and Code of Conduct" statement in your lab manual and submit a text document stating that you have read and will abide by this code of conduct. (This is part of your graded Assignment.)

For this Assignment, complete Lab 3 and write a 5-page report that:

• Describes the organization you are targeting; include a link to its website.

• Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.

• Includes information on servers and security countermeasures.

• Evaluates your public domain information findings.

• Provides a scenario of how an attacker might use this information to socially engineer the organization.

• Recommends precautionary measures to the organization.

In the last Assignment, you learned that one way hackers select potential targets is by data gathering and footprinting. However, this is not the only way. Hackers also can select targets indirectly via social engineering tactics. For example, a hacker might send out a mass e-mail from a compromised server that contains a phishing scam. Another way a hacker might select a target is by vulnerability, such as by scanning machines connected to the Internet for specific vulnerabilities.

If you own a PC, you likely are familiar with Windows Update, which installs updates and patches (i.e., security fixes) to Microsoft products. Patches are essential because they fix known vulnerabilities. If patches are not applied, machines are vulnerable, regardless of any other security measures they have in place. In this lab, you will don the black hat again and compromise and exploit a vulnerable Windows machine.

For this Assignment, complete Lab 4 (Deliverables 1-3: 2-page text file) and write a 1-page memo that answers Lab Assessment Questions and Answers numbers 3, 4, 5, and 6.

Link to lab. I will get you sign info.

https://jblcourses.com/

Reference no: EM131287524

Questions Cloud

Concepts of rebirth and karma between hinduism and buddhism : Write a paper about the differences on the concepts of rebirth and karma between Hinduism and Buddhism.- What are the roles of Gods in Samsara.
Write down the new demand equation : The government believes that the market-clearing price is too low. To increase the price the government purchases 122 million bushels of wheat. This shifts the demand curve to the right. Write down the new demand equation.
Identify a business strategy that is appropriate for company : Identify a business strategy that is most appropriate for the company, and include an analysis of why you believe this is the case. Create a list of essential guideposts for developing a total compensation policy.
Director of international operations : The thinking of the Director of International Operations is that there is a business opportunity with countries that are leading Foreign Direct Investment partners into Vietnam's economy.
Describes the organization you are targeting : Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.Includes information on servers and security countermeasures.Evaluates your public domain information findings.
What are the main features of each evaluation method : What are the main features of each evaluation method? Examine each method by looking at its potential downside. What are the essential weaknesses in each of these evaluation methods?
Temporary and permanent increases in their incomes : Why is it important that consumers respond differently to temporary and permanent increases in their incomes? A) This implies that consumption will be highly sensitive to temporary changes in income.
Analyze the advantage of broadbanding as a compensation plan : Analyze the advantages and disadvantages of broadbanding as a compensation plan. How might broadbanding help with being successfully competitive compared to alternative salary structure ranges that might be used?
Apply the formula for the area of a triangle : The price at point f is $48 per bag. The price at point g is $13 per bag. Apply the formula for the area of a triangle (Area = ½ × Base × Height) to answer the following questions.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Critical-thinking questions1 as a member of a management

critical-thinking questions1. as a member of a management team reviewing an operations improvement plan what

  Modelsimplementation strategiesapplicationsis

modelsimplementation strategiesapplicationsis planningplease help with the following study questions. detail responses

  Discuss the value each places on dashboards

After reviewing the case study in "O'Brien: Real World Case 1 Oracle Corporation and Others: Dashboards for Executives and Business Professionals: The Power and the Challenge," write a 2-4 page paper evaluating why executives and small business ow..

  Trend reports on the topic information technology

Write five trend reports on the topic Information Technology & business starting with January-December 2015 (nothing earlier) in hard (paper) and soft (electronic file)

  Describe what your products and services will be

Describe what your products and services will be and the pricing strategy involved for your chosen business.- Provide an introductory paragraph to explain your business briefly and the intention in writing this paper.

  Identify and suggest some digital innovation

Prepare a strategy report for the Chief Executive Office and Chief Information Officer which analyses the current state of the organisation and existing concerns

  Explain the it solution you are proposing

Your annotated outline will define and explain the IT solution you are proposing and address each of the next steps shown below that UMUC Haircuts will take to implement your technology solution

  Spread of surveillance technology threaten privacy

Technology and Privacy and With this thought in mind: "Does the Spread of Surveillance Technology Threaten Privacy?"

  This post addresses why the smartphone is attractiveexplain

this post addresses why the smartphone is attractive.explain the condition that makes it attractive.i came up with you

  Information technology - analog and digital signalsidentify

information technology - analog and digital signalsidentify the difference between analog and digital signals. provide

  Transnational and multinational organizationsit is

transnational and multinational organizationsit is important that there be clarity in the use of terms used to describe

  Describe and justify benefits through a real-world

Describe and justify its benefits through a real-world example e.g. healthcare, online shopping, public transportation, national security/anti-terrorism, etc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd