Evaluates your public domain information findings

Assignment Help Management Information Sys
Reference no: EM131284600

You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet provides a wealth of information on seemingly any topic and a means of connecting information. Because of this, hackers can create significant dossiers on potential targets. As an IT professional, you will want to be familiar with your company's Internet footprint and, when possible, reduce this attack surface by removing or securing any information that has not been officially released by the company. In this lab assignment, you will don the black hat again and perform data gathering and footprinting on an organization of your choice.

To prepare for this Assignment, read the Assignment 1 notes in the Unit 3 Notes, which is located in this week's Learning Resources, before proceeding.

Read the "Ethics and Code of Conduct" statement in your lab manual and submit a text document stating that you have read and will abide by this code of conduct. (This is part of your graded Assignment.)
For this Assignment, complete Lab 3 and write a 5-page report that:

• Describes the organization you are targeting; include a link to its website.

• Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.

• Includes information on servers and security countermeasures.

• Evaluates your public domain information findings.

• Provides a scenario of how an attacker might use this information to socially engineer the organization.

• Recommends precautionary measures to the organization.

In the last Assignment, you learned that one way hackers select potential targets is by data gathering and footprinting. However, this is not the only way. Hackers also can select targets indirectly via social engineering tactics. For example, a hacker might send out a mass e-mail from a compromised server that contains a phishing scam. Another way a hacker might select a target is by vulnerability, such as by scanning machines connected to the Internet for specific vulnerabilities.

If you own a PC, you likely are familiar with Windows Update, which installs updates and patches (i.e., security fixes) to Microsoft products. Patches are essential because they fix known vulnerabilities. If patches are not applied, machines are vulnerable, regardless of any other security measures they have in place. In this lab, you will don the black hat again and compromise and exploit a vulnerable Windows machine.

For this Assignment, complete Lab 4 (Deliverables 1-3: 2-page text file) and write a 1-page memo that answers Lab Assessment Questions and Answers numbers 3, 4, 5, and 6.

Link to lab. I will get you sign info.

https://jblcourses.com/

Reference no: EM131284600

Questions Cloud

What is the excess burden of taxation : what is the excess burden of taxation? why is there an excess burden, and what factors affect the size of the excess burden for a specific tax? if several goods are to be tax, how should the taxes be distributed to minimize the excess burden of ta..
Why has the internet operated under net neutrality : What is net neutrality? Why has the Internet operated under net neutrality up to this point in time?- Who's in favor of net neutrality? Who's opposed? Why?
What activities have the greatest slack or float : What is the critical path for the project? How much slack / float is in your project? What activities have the greatest slack / float? Identify the top three activities that you believe could impact the project completion date.
Develop a master production schedule for the breadmaker : Develop a master production schedule for the breadmaker. What do the projected ending inventory and available-to-promise numbers look like? Has Realco "overpromised"? In your view, should Realco update either the forecast or the production numbers..
Evaluates your public domain information findings : Describes the organization you are targeting; include a link to its website.Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.
Constructor that accepts the string str : Write a class called FileOperations that accepts a string value in a variable called str which represents the name of a text file residing on an external storage device. Provide the following:
Explain a team''s communication : How did the other team member view the experience? In what ways was this similar or different from your own, and why do you think this might be?
Critically analyze the professional and ethical standards : Critically analyze the professional and ethical standards expected of those in the accounting profession of non-profit organization accounting.
Manage the transition from ipv4 to ipv6 : Write an email to your CIO (Chief Information Officer) detailing your recommendations to successfully manage the transition from IPv4 to IPv6. Justify each recommendation.

Reviews

Write a Review

Management Information Sys Questions & Answers

  To what degree should organizations depend on large database

Write an effective short paper on the topic: "To what degree should organizations depend on the analysis of large databases and other IT resources to formulate basic strategy?"

  Describe two companies with a global presence

Describe two companies with a global presence and describe the IT governance organization and structure of each

  Identifying and discussing several new it technologies

Select one of these technologies and determine what methods you would use to integrate this technology into a company of your choosing. Explain why you chose this technology and what advantages it presents to the company.

  What does ford mean by global gridlock

Explain the concept of connected cars. Why does Bill Ford see a need for connected cars? What does Ford mean by "global gridlock"? Brainstorm a few other ways in which an IT network could help to reduce global gridlock. Do not limit yourself to cur..

  Compare and contrast database backup and disaster planning

This paper will be 5 pages total: (a) Describe Database Backup - 2 pages, (b) Describe Disaster Planning - 2 pages, (c) Highlight the importance of the integration of both backups and disaster planning and the impact if both are not effectively e..

  Create a business impact analysis on sangrafix

Create a business impact analysis on SanGrafix a video game design company. The BIA should include a descriptive list of the organization's key business areas. The BIA helps to identify and prioritize critical IT systems and components. A template..

  What are the critical success factors for retail e-business

What is the source of expertise behind Amazon's online book recommendations and how do you feel about online merchants tracking your purchases and using this information to recommend additional purchases?

  What is the purpose of cost accounting iss

What is a supply chain? What is the purpose of supply chain management systems? What is the purpose of cost accounting ISs? What is the relationship between CAD and CAM systems?

  Provide an example of an organization

Businesses that use technology to change its level of learning and provide an example of an organization

  Describing a failed is implementation project

Find an online article describing a failed IS implementation project. As you read the article make a note of the reasons given for the project failure, classifying them as technological (hardware/software did not work, etc.) or organizational (cu..

  How information can use for corporate performance management

Explain how information can be used for corporate performance management. Draw a diagram summarizing how an organization processes information.

  Why do technology based enterprises use both stage gate

Why do Technology based enterprises use both Stage Gate techniques and Concurrent engineering approaches simultaneously for their innovation processes?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd