Reference no: EM133395786
The assignment requires you to demonstrate an awareness of basic penetration tools and practices.
Answer the following questions:
1. For each of the relevant sections in the computer misuse act 1990 (1, 2 and 3) describe two scenarios. Firstly, one in which a "normal" person may be prosecuted, and secondly, one in which a penetration tester may be prosecuted while working, assuming their scope of work is invalid.
2. Using the information below, generate a scope of work for a penetration testing engagement. This is to include:
a. A list of suggested methodologies to be carried out
b. Prerequisites to carry out the methodologies engagement
c. Questions to obtain information that is missing and/or insufficient.
We have an AWS based infrastructure, combining regular VM's with ECS containers. Our field engineers log into the public front-end with their domain credentials, which then grants them access to a web-based RDP session. From here they access the administration website, this runs on a wildfly server and supporting database is hosted using RHEL 6.8. The public facing website is load balanced using the AWS loadbalancer service and our own kubernetes instance in then cloud.