Explain different types of scanning and scanning methodology

Assignment Help Management Information Sys
Reference no: EM131148614

Assignment 1: Attack Methodology and Countermeasures

Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment.

Write a two to four (2-4) page paper in which you:

Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.

Assess the overall importance of the five (5) major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.

Suggest the key countermeasures that a security administrator could take in order to protect a company's assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.

Describe footprinting and passive information and competitive intelligence gathering.

Explain the different types of scanning and scanning methodology.

Describe enumeration and different techniques used for enumeration.

Examine the functions and impact of malicious programs and their countermeasures.

Use technology and information resources to research issues in ethical hacking.

Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131148614

Questions Cloud

How operation management activity affect customer experience : Analyze how operation management activities affect the customer experience. Select two operation management challenges and provide the solutions for confronting them.
What is the probability that the project will result in loss : The management of Madeira Manufacturing Company is considering the introduction of a new product. The fixed cost to begin the production of the product is $33,000. The variable cost for the product is uniformly distributed between $20 and $27 per uni..
Prepare a flexible overhead budget : prepare a flexible budget report showing the differences (favorable and unfavorable) in manufacturing overhead costs for the month of March.
What does it mean to segment market : What does it mean to segment a market and why do we do it? List the types of potential segmenting dimensions and choose a product that you use or would like to buy. Explain which you would apply first, second and third for this business or product an..
Explain different types of scanning and scanning methodology : Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chose..
How did the financial crash impact you and your family : After watching the Inside the Financial Crash video, how did this financial crash impact you, your family, a career you may have been laid-off from, and/or someone you know that were affected?
Solving for optimal solution to aggregate planning problem : When Discussing several advantages of linear programming and clearly explain the reasons for my choices. Our text defines linear programming as "a way of solving for the optimal solution to an aggregate planning problem". Linear programming has a few..
What would be fv if interest rate is a simple interest rate : What would be the FV if the interest rate is a simple interest rate? What would be the FV if the interest rate is a compound interest rate?
Discuss roles of cytokines and integrins in wound healing : Roles of cytokines in angiogenesis and communication between key cells of the healing mechanisms. Role of integrins in re-epitheliasation of wounds etc.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Which security officer is correct about food service

Security officer A says that soiled-linen chutes aren't a problem area for healthcare center security. Security officer B says that the food service area is a prime location for theft. Which security officer is correct

  What name is given to a method of developing software

What name is given to a method of developing software that is based on small project iterations, or sprints, instead of long project schedules

  Conduct a vulnerability

You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.

  Paper on environmental factors of honda motors

Environmental Factors of Honda Motors - Write a paper in which you identify the environmental factors that affect global and domestic marketing decisions

  Explanation to management information systems

Detailed Explanation to Management Information Systems

  Why should a business use microsoft xp pro

Why should a business use Microsoft XP pro - Advantages and disadvatages compared to the others.

  Improve relationships with vendors

Collaboration Improving the Supply Chain - How can collaboration help health care centers to improve relationships with vendors?

  Change resistancein your own words please answer the

change resistancein your own words please answer the following there are many sources for change resistance. in

  Systems planning, development and implementation

Systems Planning, Development, Implementation: what are different types of designs -  characteristics of the system, such as the number, types, and locations of workstations, processing hardware.

  Context diagram of the computerised inventory system

Context diagram of the computerised inventory system at a variety store from the perspective of the purchasing department

  Select task that program could perform over an array of item

Select a task that a program could perform over an array of items that would be used by a small business. Your task must include the following: Declaring array and Populating the array.

  Supply management chains

Supply Management Chains - Explain possible situations where leagility has maximum benefit for the organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd