Calculate on network to be safe

Assignment Help Basic Computer Science
Reference no: EM13829854

Problem:

Scenario:

You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief. Following the appointment of the new police chief, you discovered a plain text file in the root of the C: drive on a server that said "hacked by the KDC."

You have reported this to your immediate supervisor, who has assigned you to perform a penetration test on the agency's network and to perform a vulnerability assessment. Although you strongly agree with your supervisor and realize that such measures are necessary, you believe that it would be much more appropriate to outsource this to a security consulting firm.

To fulfil your supervisor's initial request, you are preparing to perform a preliminary network penetration test on your agency's network. However, you prefer to take an automated approach and are wondering if such network penetration tools exist.

Task:

A. Create a memo (suggested length of 4-5 pages)requesting permission to obtain a network penetration tool by doing the following:

1.  Describe three possible network penetration testing tools that you deem to be most practical for the scenario.

2.  Compare the limitations of each of these three tools.

3.  Explain how you could use each of these three tools to perform a network penetration test.

B. When you use sources, include all in-text citations and references in APA format.

Additional Information:

The scenario is from Computer Science and it is talking about networking security, penetration testing and vulnerability testing. In the recent years, due to the phenomenon of hacking, it has become absolutely essential to secure business computer or a calculate on network to be safe from hacking. In this scenario, a computer science professor seeks permission of police department to hack their server and check whether or not server has firewalls strong enough to withstand an intruder's attacks.

Total Word Limit: 1231 Words

Reference no: EM13829854

Questions Cloud

Ways to prevent network intrusion : You are the manager of a large division of your company. One of the supervisors under your leadership handles customer complaints. This supervisor recently received an e-mail addressed specifically to the supervisor from a customer complaining tha..
What did you learn from your observation : What did you learn from your observation and interview about the child's typical language activity? Give examples of the child's use of "language" that provide evidence of the child's stage of language development. Describe the type of interactions b..
Decision support system scenario analysis : Assumption: Your Company was able to purchase major holdings in FaceTalk. As a result of the stellar work of your committee, all of you were given big bonuses at the end of the 4th quarter.
How the relationship between narrator and zhu wenli changes : Describe how the relationship between the narrator and zhu wenli changes over the course of ha jin's short story "a decade" from his collection under the red flag
Calculate on network to be safe : You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks.
Describe the health and physical education standards : The question is about Sociology and the question is describe the health and physical education standards in respective states and at the national level.
Find the average of the voltage and current : Find the average of the voltage and current and Find the rms component of the voltage -  Plot the harmonic spectrum
Understand jose and foster growth : How you might respond to this early childhood teacher with regard to steps in the assessment process that should be taken to better understand Jose and foster growth and learning at this point in time
Define the notion of state territorial morphology : Define the notion of state territorial morphology and discuss its application to Cambodia, Malaysia and Thailand, respectively

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Evaluate student ability to research and evaluate security

Evaluate the student  ability to research and evaluate security testing software and present a proposal for review by executive team members

  Central role of it in the contemporary business organization

Understand the central role of IT in the contemporary business organization. Understand the impact of the World Wide Web on the management of business

  Determining the placement of the fsmo roles

Explain the steps for determining the placement of the FSMO roles for the Acme Widget Technical School. How are these roles determined, implemented, maintained, and monitored

  Kind of information monitor check to see if it sanitize

Which kind of information should the monitor check to see if it must sanitize the data to conceal the names of the users and the names and addresses of the computers involved?

  Write script that enables user to enter eigher a fahrenheit

Use these functions to write a script that enables the user to enter eigher a Fahrenheit or a Celsius temperature and displays the Celsius or Fahrenheit equivalent.

  How to solve performance problem of computer

Your friend recommends upgrading RAM to 256 MB to correct performance problems. Is there any other way to solve performance problem? Justify your answer.

  Calculate the average cpi for each machine

Calculate the average CPI for each machine, M1, and M2 and calculate the average MIPS ratings for each machine, M1 and M2.

  Find whether bit string contains two consecutive one bits

You wish to find out whether bit string contains two consecutive 1 bits. Obviously, you can do this using n probes. For which values of n in range {3, 4, 5, 6, 7} can this be done using fewer than n probes?

  How a company developed a template for a web page

Marion has argued that with modern information technologies, collocation of team members is no longer important. How would you respond to this claim?

  What will be the values of h1 and h2

Consider two cache organizations both of them are using 32KB cache,32 bit physical address and 32B blocks. The 1st one is 2-way set associative cache, 2nd one is direct mapped cache

  What sort of system are you building

Create a spreadsheet listing all of the components, their prices, the place or website you could purchase, the cost of each component, and an explanation of why you would choose this part - What sort of system are you building? What tasks are requi..

  Which interarrival time gives the maximum throughput

Which interarrival time gives the maximum throughput?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd