Evaluates your public domain information findings

Assignment Help Management Information Sys
Reference no: EM131284600

You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet provides a wealth of information on seemingly any topic and a means of connecting information. Because of this, hackers can create significant dossiers on potential targets. As an IT professional, you will want to be familiar with your company's Internet footprint and, when possible, reduce this attack surface by removing or securing any information that has not been officially released by the company. In this lab assignment, you will don the black hat again and perform data gathering and footprinting on an organization of your choice.

To prepare for this Assignment, read the Assignment 1 notes in the Unit 3 Notes, which is located in this week's Learning Resources, before proceeding.

Read the "Ethics and Code of Conduct" statement in your lab manual and submit a text document stating that you have read and will abide by this code of conduct. (This is part of your graded Assignment.)
For this Assignment, complete Lab 3 and write a 5-page report that:

• Describes the organization you are targeting; include a link to its website.

• Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.

• Includes information on servers and security countermeasures.

• Evaluates your public domain information findings.

• Provides a scenario of how an attacker might use this information to socially engineer the organization.

• Recommends precautionary measures to the organization.

In the last Assignment, you learned that one way hackers select potential targets is by data gathering and footprinting. However, this is not the only way. Hackers also can select targets indirectly via social engineering tactics. For example, a hacker might send out a mass e-mail from a compromised server that contains a phishing scam. Another way a hacker might select a target is by vulnerability, such as by scanning machines connected to the Internet for specific vulnerabilities.

If you own a PC, you likely are familiar with Windows Update, which installs updates and patches (i.e., security fixes) to Microsoft products. Patches are essential because they fix known vulnerabilities. If patches are not applied, machines are vulnerable, regardless of any other security measures they have in place. In this lab, you will don the black hat again and compromise and exploit a vulnerable Windows machine.

For this Assignment, complete Lab 4 (Deliverables 1-3: 2-page text file) and write a 1-page memo that answers Lab Assessment Questions and Answers numbers 3, 4, 5, and 6.

Link to lab. I will get you sign info.

https://jblcourses.com/

Reference no: EM131284600

Questions Cloud

What is the excess burden of taxation : what is the excess burden of taxation? why is there an excess burden, and what factors affect the size of the excess burden for a specific tax? if several goods are to be tax, how should the taxes be distributed to minimize the excess burden of ta..
Why has the internet operated under net neutrality : What is net neutrality? Why has the Internet operated under net neutrality up to this point in time?- Who's in favor of net neutrality? Who's opposed? Why?
What activities have the greatest slack or float : What is the critical path for the project? How much slack / float is in your project? What activities have the greatest slack / float? Identify the top three activities that you believe could impact the project completion date.
Develop a master production schedule for the breadmaker : Develop a master production schedule for the breadmaker. What do the projected ending inventory and available-to-promise numbers look like? Has Realco "overpromised"? In your view, should Realco update either the forecast or the production numbers..
Evaluates your public domain information findings : Describes the organization you are targeting; include a link to its website.Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.
Constructor that accepts the string str : Write a class called FileOperations that accepts a string value in a variable called str which represents the name of a text file residing on an external storage device. Provide the following:
Explain a team''s communication : How did the other team member view the experience? In what ways was this similar or different from your own, and why do you think this might be?
Critically analyze the professional and ethical standards : Critically analyze the professional and ethical standards expected of those in the accounting profession of non-profit organization accounting.
Manage the transition from ipv4 to ipv6 : Write an email to your CIO (Chief Information Officer) detailing your recommendations to successfully manage the transition from IPv4 to IPv6. Justify each recommendation.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd