Identify vulnerabilities identified in the hack

Assignment Help Computer Network Security
Reference no: EM133861492

Question: You began working on the Case Study investigation last week. This week, you will conduct an ethical hack of the case study assigned to you by your Instructor at the end of Week 8.

Here is Week 8 assigning that was did in week 8 In Week 8, you designed a case study; this week you will be ethically hacking it. The case study is all about assessing a system to detect potential cybercrimes that could target it. In addition, you will need to propose possible preventative actions or controls for those cybercrimes.

the case study investigation will consist of two aspects:

1. A technical investigation, as you try to ethically hack the infrastructure to report possible flaws that could be used by a cybercriminal.

2. A theoretical study, in which you critically analyze all possible design alternatives in that case study.

(Example: If the case study proposes an internal mail server that does not use SSL connection, since it targets local employees, what would be your concerns here? The design decision not to use SSL could be based on that employees are part of the trust-computing base.)
Here is week 10

Submit a 3- to 5-page report in Microsoft Word and APA format of your ethical hack in which you include the following:

Question 1: Identify vulnerabilities identified in the hack and how they might be exploited. Include screenshots. Provide an assessment of all potential cybercrimes that could target that system, including the human factor of the system.

Question 2: Propose prevention methods for those vulnerabilities and discuss how to prevent the cybercrimes from both technical and legal points of view.

Your document should be 3-5 pages long (not including the Title page or Reference list) but the quality of the work is most important, not the number of pages. Cite and reference all sources using APA format and style guidelines. Submit in a single document.

Reference no: EM133861492

Questions Cloud

Reflect on your experience and the value : A report in which you briefly reflect on your experience and the value of the knowledge you gained from completing the Lab
Daily actions and behaviors can impact environment : Describe how your daily actions and behaviors can impact the environment.
Specific task or sets of tasks : A specific task or sets of tasks that are required by the project, use up resources, and take time to complete.
General mathematical forms of ANOVA and MANOVA : Distinguish between general mathematical forms of ANOVA and MANOVA. Describe the difference between a controlled experiment and a field experiment.
Identify vulnerabilities identified in the hack : Identify vulnerabilities identified in the hack and how they might be exploited. Include screenshots. Provide an assessment of all potential cybercrimes
Paraphrase breadth and aggressiveness : Paraphrase Breadth, aggressiveness, and differentiation can support sustainable effectiveness.
Paraphrase responsible progress requires organizations : Paraphrase Responsible progress requires organizations to seek a healthy balance or tension among these economic, social, and ecological objectives.
Create or sustain higher level of readiness : Identify a strategy to help create or sustain a higher level of readiness to change with your organization
Create public policy proposal : Christian Perpective, Create a public policy proposal that outlines the key components of your plan.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd