Will a user be able to access data from a remote location

Assignment Help Computer Network Security
Reference no: EM131654701

Module Overview

Why are security controls important to an organization and its network security? Security controls are the mechanisms used to safeguard an organization's data. When these controls are being created, many factors must be considered:

• Who will have access to the data?
• Will a user be able to access data from a remote location?
• Where will information be stored?
• What kinds of devices will be allowed to access the data?

The labs in this module will be a great starting place to explore how an attacker gains access to an organization's data. An attacker has several reconnaissance steps in order to gain information about a user, organization, agency, or business. The process can include footprinting, social engineering, network enumeration, and port scanning. The initial step of information gathering is called footprinting, which is the process of gathering as much public information that is available about an information system. Footprinting gathers any information about domain names, services, scanning for open ports, remote capabilities, and any evident security controls. This process usually takes place in the form of open-source footprinting, and the information is often garnered from a public website that is accessed legally. Typically, footprinting is accomplished through a whois query to inquire public documents. After someone has completed footprinting, that individual often uses social engineering to gain access to an organization's network. Network enumeration is the process of probing and discovering domain names in a nonintrusive manner. Typically, network enumeration is identified through searching the internet and determining any networks attached to them. The results obtained can be used by a hacker to gain access to an organization's network. Finally, port scanning will identify communication outlets that can be exploited and how particular aspects of company information can expose the organization to hacking.

After engaging in the virtual activities in this module, you will have a better understanding of how hackers can exploit company information and how this information informs the development of security and response policies, security controls, and response mechanisms that can help address vulnerabilities.

While there is a discussion activity that will allow you to talk with your peers and instructor about any key points or questions, the two labs in this module should be your focus.

Learning Objectives

By the end of this module, you will meet these learning objectives:

• Appraise risk or vulnerabilities when accessing the organization information system or network
• Diagnose network security posture using Zenmap and OpenVAS
• Uncover available open ports that could be a security risk

Plan at a Glance

This is the recommended plan for completing the reading assignments and activities within the module. Additional information can be found in the module Reading and Resources section and in the task list.

8. Read Chapter 1, review the related lab presentation, and complete the lab. Post any questions or comments about the lab in the optional forum.

9. Read Chapter 2, review the related lab presentation, and complete the lab. Post any questions or comments about the lab in the optional forum.

Reading and Resources
Required Resources

Textbook: Hacker Techniques, Tools, and Incident Handling, Chapters 1 and 2

Presentations: Footprinting and Social Engineering (Lesson 1) and Port Scanning, Enumeration, and System Hacking (Lesson ¬2) Review these lecture presentations through the Jones & Bartlett lab environment.

The footprinting process involves gathering information about domain names, services, scanning for open ports, remote capabilities, and any evident security controls.

Attachment:- Lab.rar

Reference no: EM131654701

Questions Cloud

Services out-of-pocket than for hospital care : Consumers are far more likely to pay for dental services out-of-pocket than for hospital care.
Explain the six different management and team competencies : Discuss how each competency and condition leads to either task and/or personal connection by contributing to goal clarity, loyalty, trust, information sharing.
Major role in he financing of health care : What two major institutions (one private and one public) have taken a major role in he financing of Health Care in the U.S over the last half century?
Correlations with operations management-projects management : Have you seen correlations with operations management and projects management? Any experience in accounting and finance?
Will a user be able to access data from a remote location : Will a user be able to access data from a remote location? Where will information be stored? What kinds of devices will be allowed to access the data?
Discuss process of supplies neon signs to retail stores : Brandon Outdoor Advertising supplies neon signs to retail stores. A major complaint from its clients is that letters in the signs can burn out.
How much more labour will it need in order to produce : If it reduces its use of capital by one unit, how much more labour will it need in order to produce 1,600 units of output in the next period?
How does the business intelligence system at cke add value : How does the business intelligence system (BIS) at CKE add value to the business? What are some tips for developing and using the BIS described in this case?
Conventional wisdom and investment techniques : At the early stages of the past decade (2000) there was an excess of capital on an international basis, a consequence of the economy recovering.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd