Describe the legal requirements and ethical issues

Assignment Help Basic Computer Science
Reference no: EM13540395

Question:

As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business's IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too "flat." During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan.

Non-stateful packet firewall separates the business's internal network from its DMZ.

All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN.

All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one.

Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5.

One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM.

Write a six to eight (6-8) page paper in which you:

Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan).

Determine the expected results from tests and research based on the specific informational details provided. (i.e., IIS v5, Windows Server 2000, AD server not using NTLM)

Analyze the software tools you would use for your investigation and reasons for choosing them.

Describe the legal requirements and ethical issues involved.

Using Visio or its open source alternative, provide a diagram of how you would redesign this business' network. Include a description of your drawing. Note: The graphically depicted solution is not included in the required page length.

Propose your final recommendations and reporting. Explain what risks exist and ways to either eliminate or reduce the risk.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:

Perform vulnerability analysis as well as external and internal penetration testing.

Demonstrate the ability to describe and perform penetration tests on communication media to include wireless networks, VoIPs, VPNs, Bluetooth and handheld devices.

Use technology and information resources to research issues in penetration testing tools and techniques.

Write clearly and concisely about Network Penetration Testing topics using proper writing mechanics and technical style conventions.

Verified Expert

Reference no: EM13540395

Questions Cloud

Compute the radiation pressure on the mirror : A23.0-mW laser beam of diameter1.85mm is reflected at normal incidence by a perfectly reflecting mirror. Calculate the radiation pressure on the mirror
What is the maximum value of the distance : A uniform plank of length 4.00 m and weight 350 N rests horizontally on two supports, with 1.00 m of the plank hanging over the right support. What is the maximum value of the distance x before the plank begins to tip
Explain the chemical equation must dehydration of water : When the sample is ready to boil, the beaker is removed and the reaction is allowed to settle for a moment. What reaction has taken place. Provide the chemical equation. Since the reaction involves concentrated acid, then it must dehydration of wa..
Find the vertical velocity of the projectile launched : A projectile is launched on an unnamed planet. The projectiles vertical position is y(t)= -5t^2 + 15t +50, find the vertical velocity of the projectile launched
Describe the legal requirements and ethical issues : Determine the expected results from tests and research based on the specific informational details provided and describe the legal requirements and ethical issues involved
What is the buoyant force that acts on the ship : What weight of water is displaced by a 100-ton floating ship? What is the buoyant force that acts on the ship
Obtain what is the voltage across the capacitor : A 9500-pF capacitor holds plus and minus charges of 16.5 x 10^-8. What is the voltage across the capacitor
Explain strength of intermolecular forces of h2o : Arrange the following substances in order of increasing strength of intermolecular forces: H2O, He, I2, and N2.
Evaluate how fast will the electron be moving : An electron starts from rest 32.5 cm from a fixed point charge with Q=-0.125 µC. How fast will the electron be moving when it is very far away

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What influence the concept of pervasive computing

What you believe the eventually influence will be of concept of "pervasive computing" or"location based services" will be on society.

  Design a hashed file of words

Design a hashed file of words that could be used as a spell checker. What would you use as a hash function? Would your choice of a hash function depend on the language from which the words are chosen? Why should such a file not be stored as a sequent..

  Create a column of integers 1 through 30

In the next three columns show how each value is represented using the binary, octal, and hex number systems. Identify when and why each of the each three numbering systems is used ?

  Deliver software to a schedule

You are asked by your manager to deliver software to a schedule that you know can only be met by asking your project team to work unpaid overtime.

  Why is the same not true if is replaced

Explain why replacing the extracellular with choline has little effect on the resting potential of an axon. Calculate the new resting potential with 90% of the extracellular removed. Why is the same not true if is replaced? (Assume the conductance..

  Write a test program that prompts the user

public static int binaryToDecimal(String binaryString)Write a test program that prompts the user to enter a binary string and displays its decimal equivalent.

  Find the percentage of swap operations in instruction mix

If implementation of instruction in hardware will increase th clock period of single-instruction implementation by 10%, what percentage of swap operations in instruction mix would suggest implementing it in hardware?

  Laws and regulation in telecommunications field

Do you believe we require laws and regulation in telecommunications field at all? Why or why not?

  Describe three of your favorite features of word

Each feature you describe should be a two to three sentence paragraph. b. The letter should be free of spelling and grammar errors.

  Modify the btod procedure

Modify the BTOD procedure so that leading zeros are replaced by blanks. For example, if the result is "0" - "5" - "9," the leading 0 in the hundreds position gets replaced by a blank, giving " " - "5" - "9."

  Automated emails from google apps spreadsheet ?

How to send automated emails from google apps spreadsheet ?

  Define a class to represent time

Define a class to represent time, in military format. Your class should have three private data members.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd