Reference no: EM13829854
Problem:
Scenario:
You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief. Following the appointment of the new police chief, you discovered a plain text file in the root of the C: drive on a server that said "hacked by the KDC."
You have reported this to your immediate supervisor, who has assigned you to perform a penetration test on the agency's network and to perform a vulnerability assessment. Although you strongly agree with your supervisor and realize that such measures are necessary, you believe that it would be much more appropriate to outsource this to a security consulting firm.
To fulfil your supervisor's initial request, you are preparing to perform a preliminary network penetration test on your agency's network. However, you prefer to take an automated approach and are wondering if such network penetration tools exist.
Task:
A. Create a memo (suggested length of 4-5 pages)requesting permission to obtain a network penetration tool by doing the following:
1. Describe three possible network penetration testing tools that you deem to be most practical for the scenario.
2. Compare the limitations of each of these three tools.
3. Explain how you could use each of these three tools to perform a network penetration test.
B. When you use sources, include all in-text citations and references in APA format.
Additional Information:
The scenario is from Computer Science and it is talking about networking security, penetration testing and vulnerability testing. In the recent years, due to the phenomenon of hacking, it has become absolutely essential to secure business computer or a calculate on network to be safe from hacking. In this scenario, a computer science professor seeks permission of police department to hack their server and check whether or not server has firewalls strong enough to withstand an intruder's attacks.
Total Word Limit: 1231 Words
Ways to prevent network intrusion
: You are the manager of a large division of your company. One of the supervisors under your leadership handles customer complaints. This supervisor recently received an e-mail addressed specifically to the supervisor from a customer complaining tha..
|
What did you learn from your observation
: What did you learn from your observation and interview about the child's typical language activity? Give examples of the child's use of "language" that provide evidence of the child's stage of language development. Describe the type of interactions b..
|
Decision support system scenario analysis
: Assumption: Your Company was able to purchase major holdings in FaceTalk. As a result of the stellar work of your committee, all of you were given big bonuses at the end of the 4th quarter.
|
How the relationship between narrator and zhu wenli changes
: Describe how the relationship between the narrator and zhu wenli changes over the course of ha jin's short story "a decade" from his collection under the red flag
|
Calculate on network to be safe
: You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks.
|
Describe the health and physical education standards
: The question is about Sociology and the question is describe the health and physical education standards in respective states and at the national level.
|
Find the average of the voltage and current
: Find the average of the voltage and current and Find the rms component of the voltage - Plot the harmonic spectrum
|
Understand jose and foster growth
: How you might respond to this early childhood teacher with regard to steps in the assessment process that should be taken to better understand Jose and foster growth and learning at this point in time
|
Define the notion of state territorial morphology
: Define the notion of state territorial morphology and discuss its application to Cambodia, Malaysia and Thailand, respectively
|