Explain different types of scanning and scanning methodology

Assignment Help Management Information Sys
Reference no: EM131148614

Assignment 1: Attack Methodology and Countermeasures

Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment.

Write a two to four (2-4) page paper in which you:

Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.

Assess the overall importance of the five (5) major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.

Suggest the key countermeasures that a security administrator could take in order to protect a company's assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.

Describe footprinting and passive information and competitive intelligence gathering.

Explain the different types of scanning and scanning methodology.

Describe enumeration and different techniques used for enumeration.

Examine the functions and impact of malicious programs and their countermeasures.

Use technology and information resources to research issues in ethical hacking.

Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131148614

Questions Cloud

How operation management activity affect customer experience : Analyze how operation management activities affect the customer experience. Select two operation management challenges and provide the solutions for confronting them.
What is the probability that the project will result in loss : The management of Madeira Manufacturing Company is considering the introduction of a new product. The fixed cost to begin the production of the product is $33,000. The variable cost for the product is uniformly distributed between $20 and $27 per uni..
Prepare a flexible overhead budget : prepare a flexible budget report showing the differences (favorable and unfavorable) in manufacturing overhead costs for the month of March.
What does it mean to segment market : What does it mean to segment a market and why do we do it? List the types of potential segmenting dimensions and choose a product that you use or would like to buy. Explain which you would apply first, second and third for this business or product an..
Explain different types of scanning and scanning methodology : Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chose..
How did the financial crash impact you and your family : After watching the Inside the Financial Crash video, how did this financial crash impact you, your family, a career you may have been laid-off from, and/or someone you know that were affected?
Solving for optimal solution to aggregate planning problem : When Discussing several advantages of linear programming and clearly explain the reasons for my choices. Our text defines linear programming as "a way of solving for the optimal solution to an aggregate planning problem". Linear programming has a few..
What would be fv if interest rate is a simple interest rate : What would be the FV if the interest rate is a simple interest rate? What would be the FV if the interest rate is a compound interest rate?
Discuss roles of cytokines and integrins in wound healing : Roles of cytokines in angiogenesis and communication between key cells of the healing mechanisms. Role of integrins in re-epitheliasation of wounds etc.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Define specific areas in which it may support company

Identify and briefly describe five specific areas where IT represents a risk to a company's competitive advantage. Identify and briefly describe five specific areas in which IT may support or promote a company's competitive advantage.

  Differences between white hat and gray hat hackers

Research the art and science of ethical hacking. Provide a plain English summary of your research in which you answer the following: What are the primary differences between white hat and gray hat hackers? Is it possible for hacking to be conducted ..

  What kind of conversion procedures were being used

Discuss a recent experience with an information system that was undergoing a change or upgrade. What kind of conversion procedures were being used? How did this affect your interaction with the system as a user? Were others affected, as well?

  Technology decision buy develop internally or hire an

technology decision buy develop internally or hire an outside design firmyou now need to make a technology decision

  1 what implications and assumptions are being made

1. what implications and assumptions are being made regarding the proposed sample and how it represents the proposed

  Designers can develop the ability to know

In Security Engineering, it's quite common for designers to secure the wrong things. How do you think that system designers can develop the ability to know what the right thing is?

  Enterprise resource planning systems

"ERP architecture" - "ERP modules" - "ERP" "Enterprise Resource Planning Systems" List five journals that you found related to the key words and choose one of them to summarize.

  Explain various measurements and metrics

Explain various measurements/metrics that could be utilized to assess whether impovements made in the supply chain have met stated goals.

  Implementation of a wireless network

Describe two trends that will have either a positive or negative impact - implementation of a wireless network.

  What are the advantages and disadvantages of the electronic

what are the advantages and disadvantages of the electronic medical record for patients and for providers?1 assess the

  Explain what an information system

Explain what an Information System is  and describe its major components. Describe the relationship between Business  Architecture, IT Architecture, and Information Infrastructure.

  Hardware versus softwarewe often say that hardware is the

hardware versus softwarewe often say that hardware is the physical interface to a technology system while software is

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd