Analyze the key tools available for scanning a network

Assignment Help Computer Engineering
Reference no: EM131368138

Assignment: Attack Methodology and Countermeasures

Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment.

Write a two to four+ page a paper in which you incorporate the following into your work:

1. Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

2. Analyze the key tools available for scanning a network. Recommend one scanning tool for a hacker and one scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.

3. Assess the overall importance of the five major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.

4. Suggest the key countermeasures that a security administrator could take in order to protect a company's assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.

5. Use no less than three quality resources in this assignment. Don't limit yourself to just three, if one needs more use more. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.
• Describe footprinting and passive information and competitive intelligence gathering.
• Explain the different types of scanning and scanning methodology.
• Describe enumeration and different techniques used for enumeration.
• Examine the functions and impact of malicious programs and their countermeasures.
• Use technology and information resources to research issues in ethical hacking.
• Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131368138

Questions Cloud

Write an essay on social change on one of given topics : Write the paper as a description of your "wildest dream." If you could have your dream job or dream position in a group of people or an organization, that could affect social change, what would it be and how would you see your role?
Historical timeline and predecessor assessment draft : This week, you will submit a draft of your Historical Timeline and Predecessor Assessment. This portion of the Course Project will include a historical timeline that diagrams at least three predecessors to the emergent technology and a written ass..
Addressing income inequity and poverty : An analysis of the impact that government policies addressing income inequity and poverty could have on labor demand or supply specifically for Apple Inc.
Discuss about the post given below : A psychological assessment report is created by psychology professionals to inform groups or individuals of the assessments appropriate for their current needs. This type of report also includes a summary of the services provided to these groups o..
Analyze the key tools available for scanning a network : CIS420- Analyze the key tools available for scanning a network. Recommend one scanning tool for a hacker and one scanning tool for a security administrator that you believe provide the greatest protection for a network.
How you plan to fund the idea : CIS8011 - Assessment item Case Based Learning Activity. You are a start up with a digital idea. Write an essay to outline your idea, its value proposition, revenue sources, cost structure, relevant customer and key activities and resources involved
Describe jean piaget stages and theories of development : Who is Jean Piaget? Define and describe his stages and theories of development.
Draw a block diagram of the system : Write synthesizable VHDL code that will generate the given waveform (W). Use a single process. Assume that a clock with a 1 s period is available as an input.
Why was original too time consuming : Write detailed explanation of why design was not implemented. For example, if your design was too ambitious and you did't have time to implement it completely, what did you do instead, and why was original too time consuming?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Analyzing the companys problem

Utilizing the standard content of a system request as your guide, prepare a list of the questions that Harry requires to have answered about this project.

  Write down a program that reads a social security number

Write down a program that reads a social security number written as contiguous digits (for instance, 509435456), uses the charAt method to obtain each character and then prints each digit on a separate line followed by a colon and the digit printe..

  Advantages and disadvantages to using cots

What are the advantages and disadvantages to using COTS (Commercial Off-the-Shelf) software versus writing your own software within a company environment? Give some examples of problems you have had.

  1 how big is the mac address space the ipv4 address space

1 how big is the mac address space? the ipv4 address space? the ipv6 address space?nbspnote the size of an address

  The evolution of computer technology

Describe how concepts such as RISC, pipelining, cache memory, and virtual memory have evolved over the past 25 years to improve system performance.

  Recognize five potential risks for new project

Recognize five potential risks for new project, being sure to write some negative and positive risks. Give a detailed description of each risk and propose strategies for addressing risk.

  As you learn more about disk storage options for the web

assume you are planning web server computer capacity for a business that has 5000 business customers and sells about

  Relationship between money and time

Identify elements of concern (e.g. resources, time, cost, quality, scope, accessibility to interviewees, generation a questionnaire, distributing the questionnaire, sample size, ability to analyze/verify the results...) of your project - Relations..

  Questionyou work for a hospital and most tasks in your

questionyou work for a hospital and most tasks in your organization are performed manually. the organization has

  Convert csv file into html file

Convert CSV file into HTML file

  The web page is passed back to the client

One of the features of Javascript that we have been looking at this week is that code is interpreted within the browser environment, on client machine.

  Consider the following snapshot of a system

Problem 1: Consider the following snapshot of a system:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd