Analyze the key tools available for scanning a network

Assignment Help Computer Networking
Reference no: EM13807589

Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment.

Write a two to four (2-4) page paper in which you:

  1. Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.
  2. Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.
  3. Assess the overall importance of the five (5) major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.
  4. Suggest the key countermeasures that a security administrator could take in order to protect a company's assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13807589

Questions Cloud

What are possible impacts of this trend towards federalism : Discuss how todays interdependency and the federal governments superior taxing power contributed to a larger role for the national government. What are possible impacts of this trend towards federalism
Determine how many floors are in a building : Imagine you are working for an in-house software team for a company that wants to monitor network access points in a building. Each building has a specified number of floors, a certain number of rooms per floor, and some number of network access p..
Lot of the strategic-planning literature : To prepare for this, you have done some research and noted the generic strategies model (cost leadership, differentiation, and focus) in a lot of the strategic-planning literature.
Future success or viability of the product line : As the company's product manager, your boss (the marketing manager) is concerned about the future success or viability of the product line you oversee. She wants to make sure that you understand the reasons that could cause a popular product to be..
Analyze the key tools available for scanning a network : Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen t..
Financial issues impacting the organizations : Analyzes the basic legal, social, and economic environment in which the organizations operate. Analyzes the managerial, operational, and financial issues impacting the organizations including:
Application on morality and social responsibility : Application on Morality and Social Responsibility
Feedback on any final requests : Your work with UWEAR and PALEDENIM has been completed. You have sent an e-mail to the client requesting feedback on any final requests before you close the project. Tom Tramlin, the chief executive officer (CEO), has sent you the following e-mail ..
Explain the function of input controls : Explain the function of input controls. Identify four (4) types of input control and explain the function of each. Provide an example of a data integrity error that could occur if each of these types of input control were not in place

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain how to upgrade bus topology lan

You are asked to upgrade bus topology LAN at a friend's house to a star topology LAN. your friend wishes to connect three computers and printer and use Ethernet access method.

  On the basis of your understanding of the isoosi network

on the basis of your understanding of the isoosi network reference model of tcpip and data encapsulation in

  If you had an enterprise organization

If you had an enterprise organization of 1000 users, and had to set up an intranet web server, which web server would you use? Please explain your answer. (I just need one good paragraph).

  Perform online reconnaissance on xyz to see what

objectiveabc invitation design and xyz invitation printing have decided to merge into one company a2z invitations. abc

  How to decrement the ttl field of the packet

In addition to the above-mentioned  KeyboardInterrupt (used to terminate the program), you will need to handle any I/O-related exceptions.

  Operating systems

The figure below shows a tunnel going through a mountain and two streets parallel to each other-one at each end of the tunnel. Traffic lights are located at each end of the tunnel to control the cross flow of traffic through each inter¬section.

  Search a number of antivirus companies eg symantec mcafee

search a number of antivirus companies e.g. symantec mcafee kaspersky f secure avg bitdefender webroot eset gdata avira

  How many trace elements are shown

What objects and counters are displayed in the right pane by default and what are the first five counters listed? What instances are listed?

  Problems-mix statically and dynamically assigned addresses

Describe what types of problems could result from having a mix statically and dynamically assigned addresses on the same network.

  What to make sure network infrastructure is more secured

The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secur..

  Explain packet-by-packet fair queueing system-logical buffer

Consider a packet-by-packet fair queueing system with three logical buffers and with service rate of one unit/second. Show the sequence of transmissions for this system.

  The cio asks you to describe why you believe it is

you are the information security officer at a medium-sized company 1500 employees. the cio asks you to explain why you

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd