Will a user be able to access data from a remote location

Assignment Help Computer Network Security
Reference no: EM131654701

Module Overview

Why are security controls important to an organization and its network security? Security controls are the mechanisms used to safeguard an organization's data. When these controls are being created, many factors must be considered:

• Who will have access to the data?
• Will a user be able to access data from a remote location?
• Where will information be stored?
• What kinds of devices will be allowed to access the data?

The labs in this module will be a great starting place to explore how an attacker gains access to an organization's data. An attacker has several reconnaissance steps in order to gain information about a user, organization, agency, or business. The process can include footprinting, social engineering, network enumeration, and port scanning. The initial step of information gathering is called footprinting, which is the process of gathering as much public information that is available about an information system. Footprinting gathers any information about domain names, services, scanning for open ports, remote capabilities, and any evident security controls. This process usually takes place in the form of open-source footprinting, and the information is often garnered from a public website that is accessed legally. Typically, footprinting is accomplished through a whois query to inquire public documents. After someone has completed footprinting, that individual often uses social engineering to gain access to an organization's network. Network enumeration is the process of probing and discovering domain names in a nonintrusive manner. Typically, network enumeration is identified through searching the internet and determining any networks attached to them. The results obtained can be used by a hacker to gain access to an organization's network. Finally, port scanning will identify communication outlets that can be exploited and how particular aspects of company information can expose the organization to hacking.

After engaging in the virtual activities in this module, you will have a better understanding of how hackers can exploit company information and how this information informs the development of security and response policies, security controls, and response mechanisms that can help address vulnerabilities.

While there is a discussion activity that will allow you to talk with your peers and instructor about any key points or questions, the two labs in this module should be your focus.

Learning Objectives

By the end of this module, you will meet these learning objectives:

• Appraise risk or vulnerabilities when accessing the organization information system or network
• Diagnose network security posture using Zenmap and OpenVAS
• Uncover available open ports that could be a security risk

Plan at a Glance

This is the recommended plan for completing the reading assignments and activities within the module. Additional information can be found in the module Reading and Resources section and in the task list.

8. Read Chapter 1, review the related lab presentation, and complete the lab. Post any questions or comments about the lab in the optional forum.

9. Read Chapter 2, review the related lab presentation, and complete the lab. Post any questions or comments about the lab in the optional forum.

Reading and Resources
Required Resources

Textbook: Hacker Techniques, Tools, and Incident Handling, Chapters 1 and 2

Presentations: Footprinting and Social Engineering (Lesson 1) and Port Scanning, Enumeration, and System Hacking (Lesson ¬2) Review these lecture presentations through the Jones & Bartlett lab environment.

The footprinting process involves gathering information about domain names, services, scanning for open ports, remote capabilities, and any evident security controls.

Attachment:- Lab.rar

Reference no: EM131654701

Questions Cloud

Services out-of-pocket than for hospital care : Consumers are far more likely to pay for dental services out-of-pocket than for hospital care.
Explain the six different management and team competencies : Discuss how each competency and condition leads to either task and/or personal connection by contributing to goal clarity, loyalty, trust, information sharing.
Major role in he financing of health care : What two major institutions (one private and one public) have taken a major role in he financing of Health Care in the U.S over the last half century?
Correlations with operations management-projects management : Have you seen correlations with operations management and projects management? Any experience in accounting and finance?
Will a user be able to access data from a remote location : Will a user be able to access data from a remote location? Where will information be stored? What kinds of devices will be allowed to access the data?
Discuss process of supplies neon signs to retail stores : Brandon Outdoor Advertising supplies neon signs to retail stores. A major complaint from its clients is that letters in the signs can burn out.
How much more labour will it need in order to produce : If it reduces its use of capital by one unit, how much more labour will it need in order to produce 1,600 units of output in the next period?
How does the business intelligence system at cke add value : How does the business intelligence system (BIS) at CKE add value to the business? What are some tips for developing and using the BIS described in this case?
Conventional wisdom and investment techniques : At the early stages of the past decade (2000) there was an excess of capital on an international basis, a consequence of the economy recovering.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Eu data privacy regulations for protection of employee data

How does EU directive on protection of personal data impose requirements on organizations in non-EU countries? How does Kraft comply with EU data privacy regulations governing protection of employee data?

  What is the benefit of checking server certificates

Typically the public SSH keys used by servers are not signed by any certificate authority, but the SSH protocol does support checking certificates. Why, in practice, are server certificates rarely signed? What is the benefit of checking server cert..

  Encrypt the plaintext sendmoremoney with the key stream

Explores the use of a one-time pad version of the Vigenère cipher. In this scheme, the key is a stream of random numbers between 0 and 26. For example, if the key is 3 19 5..., then the first letter of plaintext is encrypted with a shift of 3 lett..

  Analyze and discuss the vulnerabilities

Analyze and discuss the vulnerabilities and recommend what security management can do to minimize the potential of a government or private organization being at risk for cybersecurity damage

  Result is the theft or misuse of confidential information

what is a security incident?a security incident in an organization is a serious event that can occur at any point from

  Interorganizational cybersecurity relationships

Interorganizational Cybersecurity Relationships

  Categories of tasks performed with computer forensics tools

Analyze the five categories of tasks performed with computer forensics tools and provide an example of a software tool that performs each task - Explain how a comparison table can assist a decision maker when analyzing computer forensic tools.

  Information security for document management systems

The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confide..

  Mitigating dos attacks against broadcast authentication

Mitigating DOS Attacks against Broadcast Authentication in Wireless Sensor Networks

  Calculate cost of goods sold

How would you calculate cost of goods sold? What items make up cost of goods sold? How does beginning and ending inventory affect cost of goods sold?

  Computer crime events in history

Research the Internet for two significant computer crime events in history. Gather details on the impacts of these crimes and identify the victims, identify details on how the researched crimes developed throughout time.

  An isp has received a block

An ISP has received a block of addresses in which the prefix length (n = 24). The ISP needs to make 8 sub-nets (sub-blocks) of equal sizes from this block. What is the prefix of each sub-block?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd