Tester as a penetration tester you are hired as a

Assignment Help Basic Computer Science
Reference no: EM13619971

As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business’s IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too “flat.” During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan. <br/>Non-stateful packet firewall separates the business’s internal network from its DMZ. <br/>All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN. <br/>All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one. <br/>Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5. <br/>One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM. <br/> <br/>Write a six to eight (6-8) page paper in which you: <br/>Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). <br/>Determine the expected results from tests and research based on the specific informational details provided. (i.e., IIS v5, Windows Server 2000, AD server not using NTLM) <br/>Analyze the software tools you would use for your investigation and reasons for choosing them. <br/>Describe the legal requirements and ethical issues involved. <br/>Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ network. Include a description of your drawing. Note: The graphically depicted solution is not included in the required page length. <br/>Propose your final recommendations and reporting. Explain what risks exist and ways to either eliminate or reduce the risk. <br/>Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. <br/> <br/>Your assignment must follow these formatting requirements: <br/>Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. <br/>Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. <br/> <br/>The specific course learning outcomes associated with this assignment are: <br/>Perform vulnerability analysis as well as external and internal penetration testing. <br/>Demonstrate the ability to describe and perform penetration tests on communication media to include wireless networks, VoIPs, VPNs, Bluetooth and handheld devices. <br/>Use technology and information resources to research issues in penetration testing tools and techniques. <br/>Write clearly and concisely about Network Penetration Testing topics using proper writing mechanics and technical style conventions. <br/>

Reference no: EM13619971

Questions Cloud

Henry visited the doctors office last week because of a : henry visited the doctors office last week because of a persistent cough and difficulty breathing. the bill has arrived
Select a foreign country and analyze its monetary system : select a foreign country and analyze its monetary system. research the countrys monetary system using at least five
A 25-year 1000 par value bond has an 85 annual coupon the : 1.whats the present value of a 4-year ordinary annuity of 2250 per year plus an additional 3000 at the end of year 4 if
Describe the circumstances that might create concern or : describe the circumstances that might create concern or wariness about a high margin business. provide a current or
Tester as a penetration tester you are hired as a : as a penetration tester you are hired as a consultant by a small- to mid-sized business that is interested in
A student m 97 kg runs at a velocity vi 285 ms before : a student m 97 kg runs at a velocity vi 2.85 ms before jumping on a skateboard. after jumping on the board the
A sample of alzheimers patients is tested to assess the : a sample of alzheimers patients is tested to assess the amount of time in stage iv sleep. the number of minutes spent
A coal car m1 3411 kg is rolling down the tracks at a : a coal car m1 3411 kg is rolling down the tracks at a velocity of vi 2.6 ms when a loader drops a load of coal m2
A random sample of 16 csn students is taken the average age : a random sample of 16 csn students is taken. the average age in the sample was 27 years with a standard deviation of 4

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Prepare a program that utilizes the computer class

Be sure to use variables, the Scanner class and calculations. The program should output the values of the instance variables and the results of any calculations.

  Explaining vulnerability in novice programmer-s code

You have found vulnerability in novice programmer's code and have recommended sweeping changes in your organization to address issues.

  Banner advertising on web sites trigger realization

Banner advertising on Web sites helps trigger realization that there is gap between reality and desired state which occurs in?

  What is the new functionality

What are the main concepts and metaphors that have been used for each and what is the new functionality

  How the different tasks will play a part in future career.

How the different tasks will play a part in your current position or future career.

  In order to create a unique field in a table in a database

1. in order to create a unique field in a table in a database you need to define a .viewprimary keyhost keyjoin2.a in

  Tools or tactics for risks for computing infrastructure

As part of project to assess security risks for computing infrastructure, you have found that other managers often have different idea. List any tools or tactics that could be used.

  Which structure best for the storyboard created

Case 2-3 Michael wants to create a Website based on his famous cooking show. He would like to provide instructions on how to create some of his favorite dishes. He would like his recipes to be displayed in very simple, step by step pages. Which st..

  How do you create a 4d array of int in c++

How do you create a 4D array of int in C++

  Difference between a permanent address and a care-of address

How big is the MAC address space? The IPv4 address space and what is the difference between a permanent address and a care-of address? Who assigns a care-of address?

  You are a junior staff member assigned to the chief

you are a junior staff member assigned to the chief information security officers ciso team in a major medical

  Peoplesharz is aiming to become financially self-sufficient

PeopleSharz is aiming to become financially self-sufficient by the end of 2014 at the latest. It is at this time that their venture capital funds will be exhausted but they estimate, once they hit the 50M user mark, and have deployed into production ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd