Describes the organization you are targeting

Assignment Help Management Information Sys
Reference no: EM131287524

You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet provides a wealth of information on seemingly any topic and a means of connecting information. Because of this, hackers can create significant dossiers on potential targets. As an IT professional, you will want to be familiar with your company's Internet footprint and, when possible, reduce this attack surface by removing or securing any information that has not been officially released by the company.

In this lab assignment, you will don the black hat again and perform data gathering and footprinting on an organization of your choice.
To prepare for this Assignment, read the Assignment 1 notes in the Unit 3 Notes, which is located in this week's Learning Resources, before proceeding.
read the "Ethics and Code of Conduct" statement in your lab manual and submit a text document stating that you have read and will abide by this code of conduct. (This is part of your graded Assignment.)

For this Assignment, complete Lab 3 and write a 5-page report that:

• Describes the organization you are targeting; include a link to its website.

• Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.

• Includes information on servers and security countermeasures.

• Evaluates your public domain information findings.

• Provides a scenario of how an attacker might use this information to socially engineer the organization.

• Recommends precautionary measures to the organization.

In the last Assignment, you learned that one way hackers select potential targets is by data gathering and footprinting. However, this is not the only way. Hackers also can select targets indirectly via social engineering tactics. For example, a hacker might send out a mass e-mail from a compromised server that contains a phishing scam. Another way a hacker might select a target is by vulnerability, such as by scanning machines connected to the Internet for specific vulnerabilities.

If you own a PC, you likely are familiar with Windows Update, which installs updates and patches (i.e., security fixes) to Microsoft products. Patches are essential because they fix known vulnerabilities. If patches are not applied, machines are vulnerable, regardless of any other security measures they have in place. In this lab, you will don the black hat again and compromise and exploit a vulnerable Windows machine.

For this Assignment, complete Lab 4 (Deliverables 1-3: 2-page text file) and write a 1-page memo that answers Lab Assessment Questions and Answers numbers 3, 4, 5, and 6.

Link to lab. I will get you sign info.

https://jblcourses.com/

Reference no: EM131287524

Questions Cloud

Concepts of rebirth and karma between hinduism and buddhism : Write a paper about the differences on the concepts of rebirth and karma between Hinduism and Buddhism.- What are the roles of Gods in Samsara.
Write down the new demand equation : The government believes that the market-clearing price is too low. To increase the price the government purchases 122 million bushels of wheat. This shifts the demand curve to the right. Write down the new demand equation.
Identify a business strategy that is appropriate for company : Identify a business strategy that is most appropriate for the company, and include an analysis of why you believe this is the case. Create a list of essential guideposts for developing a total compensation policy.
Director of international operations : The thinking of the Director of International Operations is that there is a business opportunity with countries that are leading Foreign Direct Investment partners into Vietnam's economy.
Describes the organization you are targeting : Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.Includes information on servers and security countermeasures.Evaluates your public domain information findings.
What are the main features of each evaluation method : What are the main features of each evaluation method? Examine each method by looking at its potential downside. What are the essential weaknesses in each of these evaluation methods?
Temporary and permanent increases in their incomes : Why is it important that consumers respond differently to temporary and permanent increases in their incomes? A) This implies that consumption will be highly sensitive to temporary changes in income.
Analyze the advantage of broadbanding as a compensation plan : Analyze the advantages and disadvantages of broadbanding as a compensation plan. How might broadbanding help with being successfully competitive compared to alternative salary structure ranges that might be used?
Apply the formula for the area of a triangle : The price at point f is $48 per bag. The price at point g is $13 per bag. Apply the formula for the area of a triangle (Area = ½ × Base × Height) to answer the following questions.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What exactly would you integrate and why

Does it make good business sense to integrate across the different lines of business represented by Lifestyle Resorts and Home-Away Hotels? What exactly would you integrate (beyond financial information) and why?

  Identify some benefits and costs associated with doing so

Discussion this week comes in two part s - Part one , for your consumption of technological resources at work (if not a work use the university) try and find out how they are charged - what do you see as the practical benefits and problems with th..

  Benefits of integrating business functional area

Enterprise Resource Planning (ERP) Technology; Sales Demand, Manufacturing and Marketing Interface. The deliverable is a two to three page paper that includes a brief summary of this material, and consideration of the following idea. Is this paper'..

  Purpose and goals of a mobile self-service

Describe the following: Purpose and goals of a mobile self-service. Target segment (audience). Audience needs and wants

  Can an individual succeed when a system fails

Important information about Systems Thinking - What is the relationship between systems thinking and individual success within an organization? Can an individual succeed when a system fails?

  Explain wal-mart business supply chain strategy

Wal-Mart Business Supply Chain Strategy - Describe how the supply chain strategy supports the overall strategy of the firm and helps them achieve their overall objectives.

  Improve patient outcomes and billing accuracy

Improve Patient Outcomes and Billing Accuracy at Marshfield Clinic - Lessons to be learned from the Clinic and Resort cases about creating, implementing, and using business intelligence Remember, BI is a complex socio-technical innovation, so think..

  Briefly compare passive and active multiprogramming

Explain why file deallocation is important and what would happen if it did not occur on a regular basis. Briefly compare passive and active multiprogramming. Explain internal and external memory fragmentation. List the 4 types of memory management me..

  Explain about technology trends

Explain about technology trends - How would you go about researching emerging technology trends

  Summarize legal process for cases involving digital crimes

Summarize the legal process for cases involving digital crimes and the affect you perceive that computer investigations can have on the process. Determine why it is important for a computer investigator to have Level 3 training to conduct an inves..

  What are the three key aspects of web 2.0

According to Barnatt, what are the three key aspects of Web 2.0 and What is the most basic premise of Net Neutrality

  Describing how information is used

Write a 700- to 1,050-word paper identifying and describing how information is used and how it flows in an organization. Explain this use in your current place of employment or an organization with which you are familiar

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd