How much information is available to potential hackers

Assignment Help Computer Network Security
Reference no: EM13313505

Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers. Some organizations do this using internal staff; however, it is much more common to see organizations hire external security consultants to perform these types of security reviews. This allows a truly unbiased outsider to attempt to gather as much information as possible to formulate an attack.

Assume that you have been selected as the security consultant to perform a comprehensive security review for an organization of your choosing. Ensure that the organization that you select has a public website that you can access and at least one web application that you can use for this task. You will review the security of the organization's website and any related web applications and consider security risks such as structured query language (SQL) injection and social engineering techniques.

To complete this task, you will need to perform a footprinting analysis of your selected company. Your comprehensive security review will involve a series of tasks that are described in detail below.

Note: Task 3 only requires "Passive" Footprinting and a discussion on SQL injection. At no time during the execution of this task should any connection be made to the Footprinting target. If you have any questions please contact the course mentor.

Task:

A. Create a multimedia presentation (e.g., PowerPoint, Keynote) (suggested length of 12-15 slides) in which you do the following:

1. Summarize your findings of a footprinting analysis you performed on your chosen organization.

2. Discuss how the information gathered during your footprinting analysis could be used to initiate an attack against the organization.

3. Discuss social engineering techniques that could be utilized to gather information regarding the organization's computer systems.

a. Present appropriate countermeasures that should be used to combat such social engineering techniques.

4. Prescribe a series of countermeasures and remedies that could be utilized to counter this type of footprinting attack.

5. Present common web server vulnerabilities that the organization is most susceptible to.

6. Present common threats against web applications that pose the greatest risk to the organization's web applications.

7. Illustrate how SQL injection could be used to obtain or destroy information from a web application's database.

8. Discuss how SQL injection techniques could pose a potential threat to the organization's web applications.

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

B. When you use sources, include all in-text citations and references in APA format.

Reference no: EM13313505

Questions Cloud

Which have user profiles that are available for transfer : Which have user profiles that are available for transfer?
The functions square and double take a single int parameter : The functions square and double take a single int parameter and return an int result.The function compute takes a value n and a function f, and returns the result of calling that function f with n as its parameter.So, compute(3,square) evaluate..
Provide kitchen staff with the functionality to display orde : Owners and managers have the ability to keep track of the inventories, quantities and item prices with additional functionality which allows for future orders to be implemented as required.
Construct an annotated bibliography : Construct an annotated bibliography - Are corporations obliged to help combat social problems or is factory farming morally justifiable?
How much information is available to potential hackers : Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers
Calculate the youngs modulus of this tendon : A 14.4 cm long tendon was found to stretch 3.79 mm by a force of 11.1 N. Calculate the Young's modulus of this tendon
Find the final speed of both vehicles after the collision : A 650-kg car stopped at an intersection is rear-ended by a 1720-kg truck moving with a speed of 22 m/s. find the final speed of both vehicles after the collision
Company called aphrodite it staffing solution : Based on a company called Aphrodite IT staffing solution,
What is the total time spent in the system by all vehicles : Vehicles arrive at a toll bridge at a rate of 430 veh/hr (the time between arrivals is exponentially distributed) Two toll booths are open and each can process arrivals (collect tolls) at a mean rate of 10 seconds per vehicle

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  How to calculate signatue for arbitrary integers

Describe how Trudy can now calculate your signature on (m1j m2k) mod n for arbitrary integers j and k. (you will also require to describe how she can also compute m1-1 mod n).

  Variation of rsa encryption and decryption

Why would a variation of RSA encryption/decryption where a single prime number is used the modolus insecure? How can someone recover a message x from the encrypted value.

  Experiences with the social networking sites

Your experiences with the social networking sites like Craig list etc etc and Why do you think social networking sites are so popular? In other words, what is their stickiness?

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  Explain computer forensics software or services

Use a web search engine to search for companies specializing in computer forensics software or services. Select two or three and write a one- to two-page report comparing what each company does.

  Describing use of kerberos for mutual authentication

Answer the following in relation to a scenario where Bob and Alice use Kerberos for mutual authentication. When Bob receives a ticket from Alice, how does he know it is genuine?

  An information security changes required in the environment

A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

  Termination of a project

As a assignment manager, you are asked to facilitate a lessons learned session as part of the assignment termination process.

  What is virtualization

What is virtualization and what are the benefits and tradeoffs and explain at least three common virtual technologies that are used.

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd