Analyze the key tools available for scanning a network

Assignment Help Computer Networking
Reference no: EM131149981

Perimeter Defense Techniques essay

Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment.

Write a two page paper in which you:

1. Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

2. Analyze the key tools available for scanning a network. Recommend one scanning tool for a hacker and one scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.

3. Assess the overall importance of the five major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.

4. Suggest the key countermeasures that a security administrator could take in order to protect a company's assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA

• Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131149981

Questions Cloud

Evaluate the credibility and validity of the study : Identify and describe the research problems, purpose, objectives, and hypothesis of the research. Evaluate the credibility and validity of the study.
Key corporate goals and objectives : A brief description of each of the brands/business units and the products and services offered and Key corporate goals and objectives such as new products, new markets, and new customers
Find an example of a middle range theory : Find an example of a middle range theory that does not contain a conceptual model. Create a model (narrative or graphical) that depicts the relationships between and among the concepts.
Describe the hr job positions and the responsibilities : Propose how you would ensure the HR strategy is in alignment with the business strategy. Describe the HR job positions and the responsibilities listed for that HR department. Determine which HR job positions you would prefer and explain why
Analyze the key tools available for scanning a network : Analyze the key tools available for scanning a network. Recommend one scanning tool for a hacker and one scanning tool for a security administrator that you believe provide the greatest protection for a network.
How might your reserve bank help you with this problem : As the executive of a bank or thrift institution, you are faced with an intense seasonal demand for loans. Assuming that your loanable funds are inadequate to take care of the demand, how might your Reserve Bank help you with this problem
Supermarket is monitored using mean and range chart : Checkout time at a supermarket is monitored using a mean and a range chart. Six samples of n = 20 observations have been obtained and the sample means and ranges computed: determine upper and lower limits for mean and range charts. Upper limit for me..
Explain how change management : Explain how change management, in the context of Lewin's or Kotter's model (select only one), can help the organization become a socially-responsible organization
How much will your monthly payment have to change : You have just taken on a 30-year, 6%, $300,000 mortgage and would like to pay it off in 20 years. By how much will your monthly payment have to change to accomplish this objective?

Reviews

Write a Review

Computer Networking Questions & Answers

  Contrast the standard network topologies

Compare and contrast 2 of the 5 standard network topologies and the different variations of these topologies. What factors would you consider when implementing a particular topology

  Describe how a proxy server works and what is the benefit

Describe how a proxy server works and what is the benefit of having a proxy server. What are the primary functions of an incident response plan, disaster recovery plan, and business continuity plan. What is the purpose of a business impact analysis

  Discuss the performance impact of be models

Discuss the performance impact of BE models. What is the significance of BE model? Discuss Universal vs contingency approaches to adoption BE models?

  Alphabet of 10 digits, 26 letters, and 3 punctuation marks

the ciphers in the following problem use this alphabet of 10 digits, 26 letters, and 3 punctuation marks - 39 charactters is all 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ

  How are they unique and what do they share

Compare and contrast each architecture. How are they unique and What do they share? What factors drive your decision?

  This results in the build-or-buy debate take the stance on

when a company has a need for software one option is to buy it from a software vendor or build it internally if the it

  Development and growth of the organization

This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assign..

  Create subnet assignment which give contiguous address space

Provide subnet assignment which gives contiguous address space to each department. (b) Do same in (a) but with department B having 70 hosts.

  Hypothetical information system project

What about your project led you to choose this methodology - What other development methodologies did you consider?

  Does using bgp make it easier to change the isp provider

Given the choice of protocols (RIP, RIPv2, EIRGP, OSPF and IS-IS) in a mid-size network, which protocol would be most appropriate for the size of this network and why? Does using BGP make it easier to change the ISP provider? Explain why or why not

  Network discussionmodule 2 application layertopic for

network discussionmodule 2 application layertopic for discussion application layer collapsethis chapter covers lots of

  What information is contained in the websites of cms

What information is contained in the websites of CMS, JC, CARF, and CLIA?What information is contained in the websites of CMS, JC, CARF, and CLIA?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd