Explain different types of scanning and scanning methodology

Assignment Help Management Information Sys
Reference no: EM131148614

Assignment 1: Attack Methodology and Countermeasures

Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment.

Write a two to four (2-4) page paper in which you:

Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.

Assess the overall importance of the five (5) major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.

Suggest the key countermeasures that a security administrator could take in order to protect a company's assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.

Describe footprinting and passive information and competitive intelligence gathering.

Explain the different types of scanning and scanning methodology.

Describe enumeration and different techniques used for enumeration.

Examine the functions and impact of malicious programs and their countermeasures.

Use technology and information resources to research issues in ethical hacking.

Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131148614

Questions Cloud

How operation management activity affect customer experience : Analyze how operation management activities affect the customer experience. Select two operation management challenges and provide the solutions for confronting them.
What is the probability that the project will result in loss : The management of Madeira Manufacturing Company is considering the introduction of a new product. The fixed cost to begin the production of the product is $33,000. The variable cost for the product is uniformly distributed between $20 and $27 per uni..
Prepare a flexible overhead budget : prepare a flexible budget report showing the differences (favorable and unfavorable) in manufacturing overhead costs for the month of March.
What does it mean to segment market : What does it mean to segment a market and why do we do it? List the types of potential segmenting dimensions and choose a product that you use or would like to buy. Explain which you would apply first, second and third for this business or product an..
Explain different types of scanning and scanning methodology : Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chose..
How did the financial crash impact you and your family : After watching the Inside the Financial Crash video, how did this financial crash impact you, your family, a career you may have been laid-off from, and/or someone you know that were affected?
Solving for optimal solution to aggregate planning problem : When Discussing several advantages of linear programming and clearly explain the reasons for my choices. Our text defines linear programming as "a way of solving for the optimal solution to an aggregate planning problem". Linear programming has a few..
What would be fv if interest rate is a simple interest rate : What would be the FV if the interest rate is a simple interest rate? What would be the FV if the interest rate is a compound interest rate?
Discuss roles of cytokines and integrins in wound healing : Roles of cytokines in angiogenesis and communication between key cells of the healing mechanisms. Role of integrins in re-epitheliasation of wounds etc.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe how big data and distributed data

Define ‘Big Data'. Describe how ‘Big Data' and distributed data fit in the modern business environment. The Internet is considered a ‘game changing' technology. Discuss at least three reasons why this is true

  Developing software for wireless devices

Developing software for wireless devices - List and briefly describe the two (2) reasons why developing software for wireless devices is challenging.

  Discussing wireless technologies

Write a 350- to 700-word proposal discussing wireless technologies. Your recommendation of at least two wireless technologies that would be beneficial to implement in the Party Plates organization

  What are some of the detractors of their technology

What are some of the detractors of their Technology? What type of improvements can be made to advance the companies Technology solution for the future? How will it provide the company with a competitive advantage?

  Information system manging

Information system Manging

  Efficient supply chain managementhow is supply chain

efficient supply chain managementhow is supply chain management important for companies that are trying to get a

  Advantages and disadvantages of using this type of layout

Review your textbook to discover the section on the four "layout types", and explain advantages and disadvantages of using this type of layout. Consider your own experience (as an employee or a customer) and think about a time that you experienced..

  Describe the case situation and structure of organization

The case study presented in Case is about the South Australian Water company trying to align information technology in a publically owned organization. Describe the case situation and structure of the organization

  The design of user interfaces is of critical importance in

the design of user interfaces is of critical importance in systems analysis and design. discuss.word limit 700

  Explain the role of business process reengineering

Explain the role of business process reengineering (BPR) in enhancing competitiveness?

  Differences between open and closed source programs

Discuss the differences between open and closed source programs. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must..

  Analyze employee and consumer privacy

Research Websites and other technologies that provide private information on U.S. citizens -Analyze employee and consumer privacy under the law and Use technology and information resources to research issues in law, ethics, and corporate governanc..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd