Reference no: EM132397556
Question: Must include screen shots!! And have a current date..
In this assignment, students will quantify a network in order to map it, ensure everything in the system is reporting correctly, and demonstrate one of the first steps a hacker would take to try to gain access to the system.
Using NMAP, quantify a home or work network. Refer to the Internet to provide guidance on the installation and configuration of NMAP. Then, identify the following:
1. The number and type of systems attached to the network (e.g., servers, cameras, workstations, mobile devices, security cameras, and so forth)
2. What is on the network
3. Who is on the network
4. The acceptable use policy or, for a workplace, the policy put out from the company
Compile your findings including screenshots from the NMAP program. Make sure to include the following statement from the asset owner: "Use of these assets are governed by , and ."
APA style is not required, but solid academic writing?is expected.
About the trends in communication and networking
: After completing your reading and assignments this week, what do you think about the trends in communication and networking?
|
Explain what tools are required to conduct a passive scan
: Explain what tools are required to conduct a passive scan on a website or company. Outline the procedures and results of the data gathering, noting any flaws.
|
Discussing use of encryption to protect data at rest
: Essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.
|
Technology in relation to different types of communication
: You have addressed several different areas of telecommunications and information technology in relation to different types of communication
|
Define number and type of systems attached to the network
: The number and type of systems attached to the network (e.g., servers, cameras, workstations, mobile devices, security cameras, and so forth)
|
Developed multiple plans and recommendations for your client
: During this course, you have developed multiple plans and recommendations for your client, Sunshine Health Corporation.
|
How would you go about determining the accuracy
: Identify which of the three views discussed in the chapter that would provide the best quality assessment for the situation described above, and explain your.
|
What are business impact analysis policies
: No matter how well your data is protected, eventually there will be a breach of security or a natural disaster. It could be the result of a human error.
|
Developing complete disaster recovery plan
: You will be developing a complete Disaster Recovery Plan to be submitted to the executive board of your company.
|