Cyber attack and ethical hacking

Assignment Help Basic Computer Science
Reference no: EM132440195

Assignment 1. Data Gathering and Footprinting on a Targeted Website

Instructions (Assignment 1)

To demonstrate your understanding of core concepts and procedures presented in this unit, you are required to complete the lab linked below.

1. Explain why the Whois tool is useful.

2. List some useful functions that are included in Sam Spade. Which do you think you will be mostly likely to use?

3. Explain what output is generated by the tracert command. Provide a scenario where you might use tracert as an investigative tool.

4. Provide a brief description of Sam Spade. Do you think Sam Spade is useful to security practitioners? Do you think hackers might find Sam Spade equally useful?

5. Discuss the privacy considerations in regards to Whois information.

6. Describe the purpose of footprinting.

7. List the primary technical contacts for the three domains.

Refer to the Data Gathering and Footprinting on a Targeted Website scoring guide to ensure that your work meets the grading criteria for this assignment.

Assignment 2. Tools to Explore Domain Information

Introduction

During your reading this week, you learned about the significance of footprinting to hackers. Hackers take everyday information and network tools and distort their purpose to aid in their hacking activities. They compile the information they learn during the footprinting phase to increase the effectiveness of their attacks. Understanding how attackers use these tools is an important first step in mitigating attacks.

Instructions

In this assignment, write a 4-5 page paper in which you:

1. Describe the most common tools used by both malicious and ethical hackers to conduct footprinting.

2. Describe why ethical hackers explore network information before carrying out an investigation.

3. Analyze the primary differences between Nslookup and Whois in assessing domain information.

4. Explain how an ethical hacker uses the information derived by use of Nslookup and Whois to mitigate network connectivity issues.

Reference no: EM132440195

Questions Cloud

Discuss the importance of preprocessing the datasets : Discuss the importance of preprocessing the datasets to ensure better data quality for data mining techniques. Give example from your own personal experience.
How you would approach your conversation with each employee : Write a plan for how you would approach your conversation with each employee, including the most essential topics to cover. As you write your plan.
Construct an essay and outline positions of each party : Briefly outline both the valid and questionable positions of each party, and suggest ways that each party might find common ground in a mutually acceptable.
HI6007 Statistics for Business Decision Making Assignment : HI6007 Statistics and Research Methods for Business Decision Making Assignment Help and Solution, Holmes Institute, Australia. How solve business problems
Cyber attack and ethical hacking : Discuss privacy considerations in regards to Whois information. Describe most common tools used by both malicious and ethical hackers to conduct footprinting.
Discuss the movement and its implications for competition : Considering the recent paradigm shift in healthcare, discuss this movement and its implications for competition. How can changing the prescribed privileges.
Discuss similarities between mission and vision statement : After researching two similar healthcare organizations in a specific geographic location, discuss the similarities and differences between their mission.
Bussiness continuity and disaster management : Bussiness Continuity And Disaster Management. Select a major organization that was located in the Hurricane Katrina disaster area.
How to create the mission of a healthcare organization : In this week, you explored the first two steps involved in the strategic planning process. Specifically, you examined how to conduct the internal and external.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is its 48-bit ethernet address for a lan using tcp/ip

The AS number in an organization is 24101. Find the range of multicast addresses that the organization can use in the GLOP block.

  Create an organizational chart showing a top-down

Create an organizational chart showing a top-down,

  Why can qc be considered part of qa

According to the IEEE definition of SQA, quality control (QC) is not equated with quality assurance (QA).

  How duties are shared with the linux device manager

Device management also includes coordination with the Hardware Abstraction Layer (HAL). Describe which devices are managed by the HAL daemon.

  Problem regarding the incremental outsourcing

What is meant by the term "incremental outsourcing"? Why would a company want to outsource incrementally rather than all at once? Do you believe a company can benefit from incremental outsourcing? Why? Give two examples of incremental outsourcing ..

  Network access control and cloud security

Network Access Control and Cloud Security. List and briefly define cloud service models. Describe some of the main cloud-specific security threats.

  Company data from personally-owned mobile devices

Management approved a pilot program in which a controlled group of users can access certain company data from personally-owned mobile devices

  What are your ideal qa methods

What are your ideal QA methods and why? (e.g. manual, automated)

  What is the size of the activation record for the functions

What would the activation record look like if the program were run and the user typed a string of length greater than 10 characters? What would happen to the program?

  The relationship between NIST and FISMA

The relationship between NIST and FISMA. This should not be a two part paper explaining what NIST and FISMA are separately.

  Design an application to take and process a pizza order

Design an application to take and process a pizza order. The user should be able to make pizza order choices from listboxes, and the application should display the order price.

  What are penalties for committing these crimes

What might the profile be for a cybercriminal who commits this type of cybercrime?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd