Discuss specific malware and social engineer

Assignment Help Computer Network Security
Reference no: EM13759263

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business's entire network topology is located in that same location. Your goal is to infiltrate the security enough to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.

Write a four to five (4-5) page paper in which you:

Explain your method of attack and operation within reasonable parameters of the law.

Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

Assess the hurdles you expect and how you plan to overcome them.

Determine how you would remain anonymous without blowing your cover.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13759263

Questions Cloud

How would you integrate the different units of wilson : Given Wilson Sporting Goods company's geographically diverse locations, various sport categories, and multiple products it is important for them to have employees who specialize. For example Billy is a baseball equipment sales agent and Jeannie is in..
Analyze issue using social contract and rule utilitarianism : Analyze issue using Social Contract, Kantianism, Act Utilitarianism, Social Contract Theory, Virtual Ethics and Rule Utilitarianism.
Sarbanes-oxley act : Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: Sarbanes-Oxley Act
Means of verification of cash-inventory-office equipment : "The best means of verification of cash, inventory, office equipment, and nearly all other assets is a physical count of units; only a physical count gives the auditors complete assurance as to the accuracy of the amounts listed on the balance sheet"..
Discuss specific malware and social engineer : Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.
Compare multi-domestic-global and transnational strategies : Compare and contrast multi-domestic, global, and transnational strategies. What environmental factors influence a firm's international strategy? What are the benefits and risks of international diversification? What are the challenges of managing mul..
Monetary base and the banks reserve ratio : Calculate the monetary base and the banks reserve ratio. - Calculate the total money creation in the economy with the help of formula.
Compatibility of strategies at the corporate-unit : The compatibility of strategies at the corporate, unit, and functional levels. Are Hiller’s general business strategy (buying distressed, undervalued properties and turning them around for eventual sale) and their human resource (HR) strategy compati..
Strategy for addressing the associated risk : For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your..

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Email viruses are typically launched by people

Email viruses are typically launched by people who modify header information to hide their identity. Brightmail's Enrique Salem says that in the future

  What was the digital crime and who was the subject or what

select a real world event related to digital forensics. this could be a crime a well documented breach or intrusion or

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  Consider the following authentication protocol

Using RSA, perform an encryption then a decryption of the message M=5 using p=3, q=11, and e=7. (please add explanation, Show all your work, not just the final answer.)

  Information security breaches

What special consequences do you foresee from information security breaches confined to online retail banking compared to online commercial banking?

  Describe the integrative functions

Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Explain the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote) and design a secure authentication technology and network security for GFI.

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  Patton-fuller community hospital networking virtual

patton-fuller community hospital networking virtual organization or an organization you are familiar with that you

  Construct a secure mac scheme by using prf

Prove the security of the MAC scheme you constructed in the previous item. In order to get the full bonus points, you are expected to provide a rigorous security proof and construct a secure MAC scheme by using PRF.

  How to cracking passwords without salt

Cracking Passwords with Salt on Linux.  Recently, an associate of yours got access to an Ubuntu Linux server. You  suspect users of this system (UST students) have a strong tendency to use the same passwords for everything (including their online..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd