Evaluates your public domain information findings

Assignment Help Management Information Sys
Reference no: EM131284600

You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet provides a wealth of information on seemingly any topic and a means of connecting information. Because of this, hackers can create significant dossiers on potential targets. As an IT professional, you will want to be familiar with your company's Internet footprint and, when possible, reduce this attack surface by removing or securing any information that has not been officially released by the company. In this lab assignment, you will don the black hat again and perform data gathering and footprinting on an organization of your choice.

To prepare for this Assignment, read the Assignment 1 notes in the Unit 3 Notes, which is located in this week's Learning Resources, before proceeding.

Read the "Ethics and Code of Conduct" statement in your lab manual and submit a text document stating that you have read and will abide by this code of conduct. (This is part of your graded Assignment.)
For this Assignment, complete Lab 3 and write a 5-page report that:

• Describes the organization you are targeting; include a link to its website.

• Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.

• Includes information on servers and security countermeasures.

• Evaluates your public domain information findings.

• Provides a scenario of how an attacker might use this information to socially engineer the organization.

• Recommends precautionary measures to the organization.

In the last Assignment, you learned that one way hackers select potential targets is by data gathering and footprinting. However, this is not the only way. Hackers also can select targets indirectly via social engineering tactics. For example, a hacker might send out a mass e-mail from a compromised server that contains a phishing scam. Another way a hacker might select a target is by vulnerability, such as by scanning machines connected to the Internet for specific vulnerabilities.

If you own a PC, you likely are familiar with Windows Update, which installs updates and patches (i.e., security fixes) to Microsoft products. Patches are essential because they fix known vulnerabilities. If patches are not applied, machines are vulnerable, regardless of any other security measures they have in place. In this lab, you will don the black hat again and compromise and exploit a vulnerable Windows machine.

For this Assignment, complete Lab 4 (Deliverables 1-3: 2-page text file) and write a 1-page memo that answers Lab Assessment Questions and Answers numbers 3, 4, 5, and 6.

Link to lab. I will get you sign info.

https://jblcourses.com/

Reference no: EM131284600

Questions Cloud

What is the excess burden of taxation : what is the excess burden of taxation? why is there an excess burden, and what factors affect the size of the excess burden for a specific tax? if several goods are to be tax, how should the taxes be distributed to minimize the excess burden of ta..
Why has the internet operated under net neutrality : What is net neutrality? Why has the Internet operated under net neutrality up to this point in time?- Who's in favor of net neutrality? Who's opposed? Why?
What activities have the greatest slack or float : What is the critical path for the project? How much slack / float is in your project? What activities have the greatest slack / float? Identify the top three activities that you believe could impact the project completion date.
Develop a master production schedule for the breadmaker : Develop a master production schedule for the breadmaker. What do the projected ending inventory and available-to-promise numbers look like? Has Realco "overpromised"? In your view, should Realco update either the forecast or the production numbers..
Evaluates your public domain information findings : Describes the organization you are targeting; include a link to its website.Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.
Constructor that accepts the string str : Write a class called FileOperations that accepts a string value in a variable called str which represents the name of a text file residing on an external storage device. Provide the following:
Explain a team''s communication : How did the other team member view the experience? In what ways was this similar or different from your own, and why do you think this might be?
Critically analyze the professional and ethical standards : Critically analyze the professional and ethical standards expected of those in the accounting profession of non-profit organization accounting.
Manage the transition from ipv4 to ipv6 : Write an email to your CIO (Chief Information Officer) detailing your recommendations to successfully manage the transition from IPv4 to IPv6. Justify each recommendation.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  What company costs can be saved using the new app

How will the mobile ordering app interface with the current point of sale system? How can the company avoid developing a website for each retail outlet? What company costs can be saved using the new app

  Explain what data protection would entail

Based on what you have learned about data protection in an online environment, prepare a 5-slide presentation to a department head or the CEO of a company to convince the audience that data protection controls would benefit their business.

  Discuss what has been the most surprising

Looking back on everything you have learned in this class, discuss what has been the most surprising or interesting lesson learned. Explain what made it so.

  Explain how to maintain database integrity

How to maintain Database Integrity - Explain how database integrity can be maintained

  Strategic thinking and tactical strategies

Assess the value of dynamic strategic thinking, particularly in the health care environment. Speculate on the most significant potential consequences should a health care organization neglect to think strategically. Give at least one (1) specific ..

  What do you feel are the most desirable rdbmss

In reviewing current help wanted advertising in the papers, online, word of mouth, and other sources, what do you feel are the most desirable RDBMSs to have experience with for a career as a DBA or database developer and what skill sets are requir..

  Evaluate the phases of business continuity planning

Evaluate the phases of business continuity planning as they relate to the organization. Analyze how the organization could use emerging trends such as Bluetooth, Wi-Fi, cell phones, and RFID to remain competitive in the future

  How technology is changing competitive business landscape

Technology and the business environment - describe how technology is changing the competitive business landscape.

  Describe the information-gathering techniques

Describe the information-gathering techniques and design methods you would propose for the project

  Discussion of the exsisting system

Discussion of the exsisting system and brief discussion of the current standard used to manage forms - manage the transistion to a scanned form.

  Database for an accounting system

Give an example of three entities that might exist in a database for an accounting system. List some of the attributes that would be stored in a table for each entity.

  Cliptomania web stores e-business launchdiscuss the

cliptomania web stores e-business launchdiscuss the strategic issues faced by cliptomania web store in launching and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd