Describes the organization you are targeting

Assignment Help Management Information Sys
Reference no: EM131287524

You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet provides a wealth of information on seemingly any topic and a means of connecting information. Because of this, hackers can create significant dossiers on potential targets. As an IT professional, you will want to be familiar with your company's Internet footprint and, when possible, reduce this attack surface by removing or securing any information that has not been officially released by the company.

In this lab assignment, you will don the black hat again and perform data gathering and footprinting on an organization of your choice.
To prepare for this Assignment, read the Assignment 1 notes in the Unit 3 Notes, which is located in this week's Learning Resources, before proceeding.
read the "Ethics and Code of Conduct" statement in your lab manual and submit a text document stating that you have read and will abide by this code of conduct. (This is part of your graded Assignment.)

For this Assignment, complete Lab 3 and write a 5-page report that:

• Describes the organization you are targeting; include a link to its website.

• Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.

• Includes information on servers and security countermeasures.

• Evaluates your public domain information findings.

• Provides a scenario of how an attacker might use this information to socially engineer the organization.

• Recommends precautionary measures to the organization.

In the last Assignment, you learned that one way hackers select potential targets is by data gathering and footprinting. However, this is not the only way. Hackers also can select targets indirectly via social engineering tactics. For example, a hacker might send out a mass e-mail from a compromised server that contains a phishing scam. Another way a hacker might select a target is by vulnerability, such as by scanning machines connected to the Internet for specific vulnerabilities.

If you own a PC, you likely are familiar with Windows Update, which installs updates and patches (i.e., security fixes) to Microsoft products. Patches are essential because they fix known vulnerabilities. If patches are not applied, machines are vulnerable, regardless of any other security measures they have in place. In this lab, you will don the black hat again and compromise and exploit a vulnerable Windows machine.

For this Assignment, complete Lab 4 (Deliverables 1-3: 2-page text file) and write a 1-page memo that answers Lab Assessment Questions and Answers numbers 3, 4, 5, and 6.

Link to lab. I will get you sign info.

https://jblcourses.com/

Reference no: EM131287524

Questions Cloud

Concepts of rebirth and karma between hinduism and buddhism : Write a paper about the differences on the concepts of rebirth and karma between Hinduism and Buddhism.- What are the roles of Gods in Samsara.
Write down the new demand equation : The government believes that the market-clearing price is too low. To increase the price the government purchases 122 million bushels of wheat. This shifts the demand curve to the right. Write down the new demand equation.
Identify a business strategy that is appropriate for company : Identify a business strategy that is most appropriate for the company, and include an analysis of why you believe this is the case. Create a list of essential guideposts for developing a total compensation policy.
Director of international operations : The thinking of the Director of International Operations is that there is a business opportunity with countries that are leading Foreign Direct Investment partners into Vietnam's economy.
Describes the organization you are targeting : Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.Includes information on servers and security countermeasures.Evaluates your public domain information findings.
What are the main features of each evaluation method : What are the main features of each evaluation method? Examine each method by looking at its potential downside. What are the essential weaknesses in each of these evaluation methods?
Temporary and permanent increases in their incomes : Why is it important that consumers respond differently to temporary and permanent increases in their incomes? A) This implies that consumption will be highly sensitive to temporary changes in income.
Analyze the advantage of broadbanding as a compensation plan : Analyze the advantages and disadvantages of broadbanding as a compensation plan. How might broadbanding help with being successfully competitive compared to alternative salary structure ranges that might be used?
Apply the formula for the area of a triangle : The price at point f is $48 per bag. The price at point g is $13 per bag. Apply the formula for the area of a triangle (Area = ½ × Base × Height) to answer the following questions.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Showing the various classes identified and their association

The normalised relations that you will implement in the software, showing the attributes and keys together with their field type and "picture" (for example, the type of data that is held - text, a date, a number etc.) A sample table of the basic r..

  Is department should or should not take lead in edm

IT research - Produce a paper discussing why you believe that the IS department should or should not take the lead in developing EDM.

  Overview of information systems

A description of the information systems type and its benefits.Example of each information systems type, the name of the vendor who built it, and the vendor's website

  Create and validate html documents

Create and validate HTML documents. Create presentations using Cascading Style Sheets and DHTML. Write clearly and concisely about Web design and development using proper writing mechanics and technical style conventions.

  Context diagram of the computerised inventory system

Context diagram of the computerised inventory system at a variety store from the perspective of the purchasing department

  Define a subquery and discuss its use in sql

Define a subquery and discuss its use in SQL

  Develop list of five to seven feature of your application

Develop a list of the top five to seven features of your application. Explain how those features pertain to your viral hook. Explain how those features will help increase wedding revenue.

  Discuss the basic concepts of simple systems

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Discuss the basic concepts of simple systems

  Global value chain managementthe benefits of global value

global value chain managementthe benefits of global value chain management. the paper needs to address how the

  Show intranets and extranets impact

Discuss intranets and extranets impact on organizations and how it has changed the way employees receive training, communicate, conduct transactions, or access information in the workplace.

  Determine the fundamental challenges that organizations face

Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information. Specify the red flag(s) that Target overlooked or ignored before the retail attack and give your opinion as to w..

  Paper about information technology in online shopping

Write term paper about Information Technology in Online Shopping

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd