Discuss specific malware and social engineer

Assignment Help Computer Network Security
Reference no: EM13759263

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business's entire network topology is located in that same location. Your goal is to infiltrate the security enough to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law.

Write a four to five (4-5) page paper in which you:

Explain your method of attack and operation within reasonable parameters of the law.

Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

Assess the hurdles you expect and how you plan to overcome them.

Determine how you would remain anonymous without blowing your cover.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13759263

Questions Cloud

How would you integrate the different units of wilson : Given Wilson Sporting Goods company's geographically diverse locations, various sport categories, and multiple products it is important for them to have employees who specialize. For example Billy is a baseball equipment sales agent and Jeannie is in..
Analyze issue using social contract and rule utilitarianism : Analyze issue using Social Contract, Kantianism, Act Utilitarianism, Social Contract Theory, Virtual Ethics and Rule Utilitarianism.
Sarbanes-oxley act : Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: Sarbanes-Oxley Act
Means of verification of cash-inventory-office equipment : "The best means of verification of cash, inventory, office equipment, and nearly all other assets is a physical count of units; only a physical count gives the auditors complete assurance as to the accuracy of the amounts listed on the balance sheet"..
Discuss specific malware and social engineer : Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.
Compare multi-domestic-global and transnational strategies : Compare and contrast multi-domestic, global, and transnational strategies. What environmental factors influence a firm's international strategy? What are the benefits and risks of international diversification? What are the challenges of managing mul..
Monetary base and the banks reserve ratio : Calculate the monetary base and the banks reserve ratio. - Calculate the total money creation in the economy with the help of formula.
Compatibility of strategies at the corporate-unit : The compatibility of strategies at the corporate, unit, and functional levels. Are Hiller’s general business strategy (buying distressed, undervalued properties and turning them around for eventual sale) and their human resource (HR) strategy compati..
Strategy for addressing the associated risk : For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your..

Reviews

Write a Review

Computer Network Security Questions & Answers

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

  Current malware activity

Question: Of the top threats, how many can be classified as viruses? Worms? Trojans? Question: How many of them were discovered today? In the past week? How many are at least 1 year old?

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  What descriptive labels might apply to this type of threat

What descriptive labels might apply to this type of threat/incident? What sort of people would go after this information? Why would they want it

  Discuss briefly the use of inheritance blocking and forcing

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

  Securing and protecting information

Securing and Protecting Information

  Explain problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. Solve problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment

  Which of the following acts have made it a crime to break

question 1the computer fraud and abuse act of 1986 prohibits .answer threatening to damage computer systems in order to

  What might be your three most important concerns

Many hackers claim to believe that "access to computers should be unlimited and total" and that "all information should be free." Do you agree with these statements? Why or why not?

  Deliver an it risk assessment case study

Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.

  Ientify another application other than course management

security change management and architectural adaptationthe online course management system from previous assignments is

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd