Calculate on network to be safe

Assignment Help Basic Computer Science
Reference no: EM13829854

Problem:

Scenario:

You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief. Following the appointment of the new police chief, you discovered a plain text file in the root of the C: drive on a server that said "hacked by the KDC."

You have reported this to your immediate supervisor, who has assigned you to perform a penetration test on the agency's network and to perform a vulnerability assessment. Although you strongly agree with your supervisor and realize that such measures are necessary, you believe that it would be much more appropriate to outsource this to a security consulting firm.

To fulfil your supervisor's initial request, you are preparing to perform a preliminary network penetration test on your agency's network. However, you prefer to take an automated approach and are wondering if such network penetration tools exist.

Task:

A. Create a memo (suggested length of 4-5 pages)requesting permission to obtain a network penetration tool by doing the following:

1.  Describe three possible network penetration testing tools that you deem to be most practical for the scenario.

2.  Compare the limitations of each of these three tools.

3.  Explain how you could use each of these three tools to perform a network penetration test.

B. When you use sources, include all in-text citations and references in APA format.

Additional Information:

The scenario is from Computer Science and it is talking about networking security, penetration testing and vulnerability testing. In the recent years, due to the phenomenon of hacking, it has become absolutely essential to secure business computer or a calculate on network to be safe from hacking. In this scenario, a computer science professor seeks permission of police department to hack their server and check whether or not server has firewalls strong enough to withstand an intruder's attacks.

Total Word Limit: 1231 Words

Reference no: EM13829854

Questions Cloud

Ways to prevent network intrusion : You are the manager of a large division of your company. One of the supervisors under your leadership handles customer complaints. This supervisor recently received an e-mail addressed specifically to the supervisor from a customer complaining tha..
What did you learn from your observation : What did you learn from your observation and interview about the child's typical language activity? Give examples of the child's use of "language" that provide evidence of the child's stage of language development. Describe the type of interactions b..
Decision support system scenario analysis : Assumption: Your Company was able to purchase major holdings in FaceTalk. As a result of the stellar work of your committee, all of you were given big bonuses at the end of the 4th quarter.
How the relationship between narrator and zhu wenli changes : Describe how the relationship between the narrator and zhu wenli changes over the course of ha jin's short story "a decade" from his collection under the red flag
Calculate on network to be safe : You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks.
Describe the health and physical education standards : The question is about Sociology and the question is describe the health and physical education standards in respective states and at the national level.
Find the average of the voltage and current : Find the average of the voltage and current and Find the rms component of the voltage -  Plot the harmonic spectrum
Understand jose and foster growth : How you might respond to this early childhood teacher with regard to steps in the assessment process that should be taken to better understand Jose and foster growth and learning at this point in time
Define the notion of state territorial morphology : Define the notion of state territorial morphology and discuss its application to Cambodia, Malaysia and Thailand, respectively

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd