Analyze the key tools available for scanning a network

Assignment Help Other Subject
Reference no: EM131152173

Assignment 1: Attack Methodology and Countermeasures

Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment.

Write a two to four (2-4) page paper in which you:

Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.

Assess the overall importance of the five (5) major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.

Suggest the key countermeasures that a security administrator could take in order to protect a company's assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.

Describe footprinting and passive information and competitive intelligence gathering.

Explain the different types of scanning and scanning methodology.

Describe enumeration and different techniques used for enumeration.

Examine the functions and impact of malicious programs and their countermeasures.

Use technology and information resources to research issues in ethical hacking.

Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131152173

Questions Cloud

Determine the buckling load under two assumptions : A set of four wood members are lashed together at several points along the length with the goal of creating a bar with a larger cross-section that is less susceptible to buckling.
Important qualities that a manager must possess : What do you feel are the most important qualities that a manager must possess to be effective? What do you feel are the most important qualities for a leader to possess to be effective
Motivate companies to fire disabled workers : Bankruptcies and takeovers often motivate companies to fire disabled workers. Do you think there should be a law that prevents companies from firing disabled workers? Why or why not? How would your answer impact the organization ethically, financi..
Explain the balanced scorecard approach to control : Identify and explain the balanced scorecard approach to control. Specify its advantages, and explain how it differs from the traditional approach to control used in most companies.
Analyze the key tools available for scanning a network : Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chose..
Considering more flexible work practices : The CEO of your company, Carla Green, is considering more flexible work practices.  These include the following: 1) Telecommuting one or two days per week
Determine the temperature at which copper tube could buckle : Determine the temperature at which the copper tube could buckle.
Write a synopsis based on given description : Write a synopsis- Propose a new product or service for the new company division.- Describe how the division addresses customer needs and achieves competitive advantage.
Discuss the hazcom responsibilities of chemical producers : Using the "downward flow of information" concept, discuss the HazCom responsibilities of chemical producers, companies whose employees use chemicals, and the employees themselves.

Reviews

Write a Review

Other Subject Questions & Answers

  Present an example of inductive reasoning

Present an example of inductive reasoning.

  What are the problems and issues discussed in the case study

What are the problems and issues discussed in the case study? Establish a context by providing an overview of leadership style, approach, and strategy. Then illustrate each problem in the case with specific examples and connect them to leadership ..

  Classical conditioning generally occur most quickly

Under what conditions will classical conditioning generally occur most quickly?

  Strategic planning division of american based multi national

Mary Thompson is the VP and and head of strategic planning division of an american based multi national. She is opening a branch in South africa. First the company has the oppurtunity to contract at an excellent price for fabric from china. However, ..

  Compare CEC Code of Ethics with Georgia PSC Code of Ethics

Compare the CEC Code of Ethics with the Georgia PSC Code of Ethics. What is similar and what is different?

  Describe ways that nike could use at least two change

Describe ways that Nike could use at least two change techniques described

  How can health education enhance health promotion for family

Mrs. Jones, a widow, is no longer able to live independently and is requiring more and more help with her self-care. Her daughter, Susie, who is married with three school-aged children, agrees to let her mother move in with her. Susie is concerned..

  Critical thinking text-convincing argument

Imagine your child is trying to prove that she did not steal chocolate chip cookies from the cookie jar, so she makes this argument: “There are no chocolate stains on my hands, so I couldn't’t have stolen the cookies.” Does this example require deduc..

  Masking poor communication

Who could know me better than my spouse or my closest and dearest friends? Is question that you may ask yourself sometimes after reading the title of the article "Close relationships sometimes mask poor communication".

  Applications of epidemiology-case study

Escherichia coli (E. coli) is a bacteria usually found in warm blooded organisms such as human and animal intestines. Although there are large groups of E.coli, most strains are harmless.

  Activity and fitness relate to the six dimensions of wellnes

How does the role of activity and fitness relate to the Six Dimensions of Wellness? How does today’s society affect our nutritional habits?

  Add some words when needed

How would you describe yourself in terms of your ability to work as a member of a team?  With team I can do many things for helping my team and I love to be a helpful person but I don’t like to be a leader of that team, because I know myself very wel..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd