Evaluate organizations information security

Assignment Help Other Subject
Reference no: EM132164150

Write a review on this article with 2 APA format references. Network security is becoming more and more crucial as the volume of data being exchanged on the Internet increases. When people use the Internet, they expect their confidentiality, data integrity, and authentication protected and secured. Due to the increasing dependency of our society on networked information system the overall security of these systems should be measured and improved.

The most accurate method to evaluate organization's information security stance is to observe how it stands up against an attack. The best way of ensuring that the system is secure is to attempt penetration testing. This would be the most effective way to find exploits and to proof whether a system a vulnerable. Penetration testing often allows the security analyst to find new vulnerabilities. Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the system.

For example, a pen tester who does not have any information about the company, passively, he/she can be as simple as watching the building to identify what time employees enter/ leave the building. However, it is usually done using the Internet searches, or by Googling to gather information about their target. Some of the passive information gathering methods could be social engineering and dumpster diving (Walker, 2017). Every pen tester begins their asset hacking by learning as much as they can about their targets. For example, they want to know IP addresses, OS platforms, applications, patch levels, advertised network ports, users, and anything else that can lead to an exploitation.

Unfortunately, ethical hacker must follow the rules of hacking because there is a thin line between black hat and white hat hacking. Therefore, to stay out of any trouble, the ethical hacker should follow certain framework for performing audit of an organization (Kruger, Nickolay, & Gaycken, 2013).

Talk to the client, and discuss the needs to be addressed during testing. Prepare and sign non-disclosure agreement (NDA) documents with the client. Prepare a schedule for testing Conduct the test Analyze the results of the testing, and prepare a report Present the final report to the client When it comes to legal issues, before taking any further steps, ethical hacker should know the penalties of unauthorized hacking into a system. No ethical hacking activities associated with a network-penetration test should begin until a signed document giving the ethical hacker express permission to perform the hacking activities is received from the company.

Furthermore, ethical hackers need to be judicious with their hacking skills and recognize the consequences of misusing those skills. For example, the Cyber Security Enhancement Act of 2002, mandates life sentences for hacker who " recklessly" endanger the lives of others. Malicious hackers who create a life-threatening situation by attacking computer networks for transportation systems, power companies, or other public services or utilities can be prosecuted under this law (Graves, 2010).

Verified Expert

Cyber security and network security to a certain extent relate to the safety of data accumulated within a particular process. There has been a significant acknowledgement of ethical consideration through adequate network and cyber security. The enhancement on these securities have allowed to highlight the safety procedures in a working area. Functionally it has also been a patent understanding of ethical response within a data storing area.

Reference no: EM132164150

Questions Cloud

What are the advantages of being a c corporation : As JIM's corporate tax and financial analyst, you will need to have a clear understanding of the tax advantages and disadvantages of the C corporation.
How change affects all stakeholders in the supply chain : Examine the readings in this module, consider how change affects all stakeholders in the supply chain.
Describe the year-end closing process : Prior to beginning work on this discussion, read Chapter 4 in the textbook. In addition, the MyLab materials listed in the Recommended Resources section.
Calculate annual bonuses for employees : You own a company that sells coffee products. You want to calculate annual bonuses for your employees.
Evaluate organizations information security : Prepare a schedule for testing Conduct the test Analyze the results of the testing, and prepare a report Present the final report to the client
Would you opt to pursue related diversification : To what extent, if any, have you and your co-managers adapted your company's strategy to take shifting exchange rates into account?
Analyzing the legal issues raised by the article or case : Select article or case in the last 3-5 years on a legal topic and write a paper between 1000 to 1500words analyzing the legal issues raised by the article.
Identify different threat categories encompassed by attack : If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, identify the different threat categories encompassed
Summarize the noncontrolling interests accounting : Written response to two questions. Please copy and paste the questions I want you to answer into your word document then answer the question please.

Reviews

len2164150

11/12/2018 1:49:15 AM

For example, I have a friend who conduct pen testing on a company, but he was detected by the security employees who noticed some illegal activities on their network system. Luckily, he had a document signed by the company to conduct pen testing on their system. The person should be brave and true to himself about conducting something beneficial to him and to society, " All Scripture is God-breathed and is useful for teaching, rebuking, correcting and training in righteousness, so that the servant of God may be thoroughly equipped for every good work." Timothy 3:16-17. The Scriptures instruct us to provide a good work ethically. Yet we must apply the word properly, follow the rules diligently, and pray for wisdom. References Walker, M. (2017). CEH Certified Ethical Hacker All-in-one Exam Guide. Third Edition. New York, NY: McGraw-Hill. Kruger, J., Nickolay, B., & Gaycken s. (2013). The secure information society: Ethical, legal,and political challenges (1. Aufl. ed). London: New York, Springer. DOI:10.1007/978-1-4471-4763-3. Graves, K. (2010). CEH Certified Ethical Hacker Study Guide. Indianapolis, Indiana: Wiley Publishing, Inc. bt

len2164150

11/12/2018 1:49:07 AM

I have to write a review on this article with 2 APA format references. Network security is becoming more and more crucial as the volume of data being exchanged on the Internet increases. When people use the Internet, they expect their confidentiality, data integrity, and authentication protected and secured. Due to the increasing dependency of our society on networked information system the overall security of these systems should be measured and improved. The most accurate method to evaluate organization''s information security stance is to observe how it stands up against an attack. The best way of ensuring that the system is secure is to attempt penetration testing. This would be the most effective way to find exploits and to proof whether a system a vulnerable. Penetration testing often allows the security analyst to find new vulnerabilities. Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the system.

Write a Review

Other Subject Questions & Answers

  Who were the stakeholders of the company

Do you think that Aaron Feuerstein owner of Malden Mills did the right thing? Who were the stakeholders of the company? Does the case change if it had been a corporation with shareholders also? Why? Why not

  Securities and exchanges commission filings

Use publicly available information, including Securities and Exchanges Commission filings.

  The three dominant ethical theories in western philosophy

Identify and define each of the three dominant ethical theories in Western philosophy. Describe how you can know if a theory is valid.

  Demonstrate familiarity with the major concepts

Demonstrate familiarity with the major concepts, theoretical perspectives, empirical findings, and historical trends in psychology. Understand and apply basic research methods in psychology, including research design, data analysis, and interpretat..

  Causes of the depletion of the ozone layer

the differences between the causes of the depletion of the ozone layer and the causes of global warming and the problems caused by each

  Preventing the groupthink concept

What might you as the leader do to prevent groupthink from causing you to made defective decisions in your group discussions?

  Variance in arsenic concentration in drinking water

Given that the variance in arsenic concentration in drinking water is 8 ppb, what is the power of a test based on 10 samples to determine if arsenic levels exceeds the public health standard of 5 ppb by 2 ppb. Assume that the test is performed at a= ..

  Examine the impact of technology on how health care

analyze the impact of technology on how health care services are delivered. the impact of technology on employee

  Discuss agencies responsible for preventing to terrorism

Considerable progress has been made with regard to the coordination and communication among agencies responsible for preventing and responding to terrorism

  Discuss and examines the current trend in the selection

Discuss and examines the current trend in the selection of physical security devices based on a solid risk management approach.

  Develop performance standards for the shift workers

Develop performance standards for the shift workers, identify appropriate methods of performance appraisal, and develop appropriate training to help get them.

  What is the basic assumption of situational approaches

What is the basic assumption of situational approaches to leadership

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd