Briefly define the purpose of penetration testing

Assignment Help Computer Engineering
Reference no: EM131884688

Assignment

1. Identify the purpose and describe at least one activity performed in each of the following three phases in implementing a network security design: (i) the planning phase; (ii) building phase (iii) managing phase.

2. Describe the purpose of the main elements of risk management, such as (i) risk identification and (ii) risk treatment. Identify at least one activity that is performed in each element.

3. Identify two types of network attacks that could be made on an e-commerce site selling books, and storing credit card information about customers. For each attack, describe the vulnerabilities/weaknesses of network infrastructure that attackers seek to exploit.

4. Give two examples of emerging security threats that have emerged as a result of the popularity of mobile phones. List one example of a countermeasure that can be used to mitigate the threats.

5. Briefly define the purpose of auditing, as it applies to network security.

6. Briefly define the purpose of penetration testing, as it applies to network security.

7. Briefly define how logging analysis can be used to enhance network security

8. List two security measures that can be applied to protect an organisation's infrastructure of servers and switches.

9. List two capabilities of (i) a hardware firewall and (ii) a software intrusion detection system (IDS)

10. Define what is meant by "defence in depth" in security planning. Describe how could the defence in depth principle be applied to the deployment of hardware and software firewalls in a corporate network a Page 5 of 21 Assessment Resources ICTNWK511

11. Give two examples of network management and security process controls that could be applied to manage the risk represented by BYOD (Bring Your Own Device) to corporate networks.

12. Risk management plans and procedures need to be applied to all stages of network security, including security planning, implementation and budgeting. Give one example of how an understanding of risk can be applied to each of the following phases of a network security implementation (i) the planning phase (ii) the implementation or building phase (iii) the managing or budgeting phase

13. Identify three types of ICT networks (or zones) typically considered in network security planning. Briefly define each of these network zones, and, for each of the three types of network zone, give one example of a configuration I would expect to see in that type of network zone.

Reference no: EM131884688

Questions Cloud

What is the breakeven stock price at expiration : You bought 1500 shares of a stock at $17 per share some time ago and have substantial profit built up as the present stock price is $32 per share.
How many round lots of stock were traded yesterday : What is the closing price at the end of the day before yesterday? How many round lots of stock were traded yesterday?
Give necessary entries for each event : During 2012 J & J made several treasury stock transactions. For each of the following give the entry(s) that J & J would have made. J & J uses the cost method.
Identify five stocks consistent with your strategy : Identify 5 stocks consistent with your strategy. Use Yahoo! Finance Stock Screener for this purpose.
Briefly define the purpose of penetration testing : Briefly define the purpose of penetration testing, as it applies to network security. Define how logging analysis can be used to enhance network security.
Determine the number of common shares : The 2013 annual report for Golden Grains disclosed that 1 billion shares of common stock have been authorized. At the end of 2012, 800 million shares had been.
What is your monthly piti payment if you escrow the taxes : Property Taxes are 120 Mills with 80 Effective Mills. What is your Monthly PITI Payment if you escrow the taxes and insurance?
What are the prices of the bond when interest rates increase : Using duration what are the prices of the two bonds when interest rates increase by 200 basis points. By a 75-basis point increase? Why?
What should tampico enterprises consider doing : Tampico Enterprises inventory turnover was 8.2 in 2X10. After analyzing several similar, competing companies, Tampico Enterprises found that the average.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd