How many locations does acxiom have active or open

Assignment Help Computer Network Security
Reference no: EM132159580

Lab - Information Recon

Objectives - To learn how to use some of the tools used by hackers to gather information about a potential target, using different techniques on varied targets to improve the chances of success when attacking and/or compromising the site.

Lab Outcome:

  • To complete the lab procedures To correctly answer the questions supplied in the lab
  • Each question is worth one mark, no partial marks.

Background information: The capabilities and tools you will be using in this lab should not be used either on the Algonquin Corporate network or any other network connection without explicit authorization from the network administrator. Otherwise, you risk being mistaken for an attacker on that network!!

Section A - Preliminary Information

However, a large portion of the tools needed are in the Kali VM already.

Other similar tools and resources are available and can be used.

Just make sure you list what tools and/or sites you did use for each answer given.

Section B - Information from public records

Your goal here is to find information about Algonquin College.

Locate and identify the following information about Algonquin College.

Q1. What is name, email address and mailing address of the main administrative contact for the algonquincollege.com domain? Provide source of information.

Q2. What information is seen in Q1 about the admin that is a security risk? Explain why & provide an alternative.

Q3. Who's the domain registrar for the algonquincollege.com domain? Provide source of information.

Q4. Where are the DNS servers physically located for Algonquin? Provide source of information.

Q5. What are ALL of the official/real algonquincollege.com DNS server IP(s)? Provide source of information.

Q6. What are ALL of the official/real algonquincollege.com mail server IP(s)? Provide source of information.

Q7. What is the public IP address range(s) owned by Algonquin College? Provide source of information.

Q8. What specific web server software(s) does algonquincollege.com use, and associated IP addresses for the main web page?

Q9. Which country has the highest percentage of visitors that have gone to the main algonquincollege.com web site?

Algonquin has multiple campuses

Ottawa, Perth, Pembroke

Q10. Is Algonquin hosting the info sites locally (i.e. same servers as main) or not? Explain how you know.

Section C - Information research about a company

Your goal here is to learn information that you can gather about an organization.

Some guiding principle you can use:

If the company is publicly traded, that means they are mandated by some level of Corporate Governance to publish corporate info, Investor info and other key tidbits.

In the US, SEC filings for corporations contains a wealth of corporate info

Can be quite different in other countries, the details of Corporate governance and compliance varies from country to country.

If the company is incorporated, the process and laws require that key info be made public.

  • A lot of the "About us" or "News" pages have a wealth of information available
  • This is especially true if it isn't just a sole proprietorship incorporated just for tax purposes and/or an International company.

Most companies WANT to talk about themselves.

  • Marketing and PR is built into corporate culture, fed by human ego and the need to tell others what you do and how well you do it.
  • It's typically a rather painful and ongoing exercise for the CSO to turn around and verify what's put out and public info... and what's out there that shouldn't be!!
  • Companies are typically information gluttons, to better understand their market and demographics. Privacy then works to ensure that non-public info companies acquire is maintained in an appropriate fashion... but...

Q11. How many people total are on the Acxiom's Board of Directors?

Q12. How many locations does Acxiom have active/open?

Q13. List 3 specific companies BY NAME that Acxiom does business with.

Section D - Information research in News Groups

Your goal here is to learn information that you can gather from Google searches about a problem an organization may be having.

Find information about a VPN problem that may have occurred for a company (or a client of the company) with a domain name of gtscad.com, question put out there by John Chapman.

Q14. What information did you find, specifically? Copy the content of the post(s) here.

Q15. What specific newsgroup(s)/forum(s) was the information posted to?

Q16. With what you know about the incident, people and companies involved, data mine (OSINT) and list any-and-all key "public" technical information you can find based on the person(s) involved and the company. (3-5 key elements minimum each to get full marks).

Q17. What should John have done to protect this information / public info from being used against his firm? Explain.

Section E - Information gathering about ... you!

Okay, using the techniques and tools you've used above, research and gather as much of the information you can find on the web about ... you!

Q18. Document everything of relevance that you found about yourself, along with where and how.

And "I didn't find anything" doesn't cut it WITHOUT strong justification - remember, I might check.

Q19. Was the first occurrence you found really about you ... or someone else with same name? Try and explain why.

Q20. How easy was it to find specific and relevant information about the actual you? Explain.

Q21. Based on what you have found and how, what kinds of details are necessary to ensure that researching an individual obtains both accurate results AND about the right person?

Section F - Data Mining - the quick demo

One example of a data mining tools is called Maltego.

Once that's done, start Maltego

  • When prompted, enter your username, password, and any other required information.
  • Be patient - the program can take a while to start up.
  • In the left-hand window, near the bottom, drag and drop a Person into the Mining View pane.
  • Double-click on the new Person icon and change the name to your own name.
  • Right-click on the changed icon and select All Transforms to start the data mining process.

Q22. Did Maltego come up with new information/relationships you had not found before? Elaborate - what kind, how relevant, etc...

Q23. How accurate are the relationships Maltego found about you? Explain.

Attachment:- Assignment File.rar

Verified Expert

Given task is based on the information gathering topic of cyber security. In which total 3-4 seanario was given. Based on given reference details, information related to domain , information related to name and information related to company was determined and questions were answered.

Reference no: EM132159580

Questions Cloud

Where could you get this media : Where could you get this media? Is it OK to copy whatever clip-art you find on the web? Why or why not? Is it OK to use part of your favorite song?
What effect does diversity have on a group : Describe some of the advantages or disadvantages of having a diverse environment as it relates to employee relations. In what ways does conflict facilitate.
Exploratory research play in marketing research process : What role does exploratory research play in the marketing research process? How does exploratory research differ from other forms of marketing research?
Finding the right employee for the right job is a complex : Human resources managers have to review applications and select those who have the qualifications and may be the right fit.
How many locations does acxiom have active or open : CST8230 Lab - Information Recon - To learn how to use some of the tools used by hackers to gather information about a potential target
Kind of challenges may google face in the future : What kind of challenges may Google face in the future?
The world in different countries and different cultures : How does a Japanese company like Toyota manage quality around the world in different countries and different cultures?
Analyze two career options in the health care industry : Analyze two career options in the health care industry, in terms of the educational requirements, job responsibilities, and average salaries.
How the host government may affect strategic implementation : Explain how the host government may affect strategic implementation in an alliance or another form of entry strategy.

Reviews

len2159580

11/4/2018 8:44:38 PM

Lab Deliverables - Answers submitted back to Blackboard by the date indicated on the course calendar. Answers to each question must follow each question. Submit the entire document to Blackboard. Change the colour of you answer text to DARK BLUE. I will deduct three marks if you don’t do this. All submissions must be in PDF, one file submission per student. All of this lab exercise may be performed outside the lab.

len2159580

11/4/2018 8:44:31 PM

Do NOT forget to quote your sources for each answer – you will not get marks without them! Follow these procedures carefully. If at any time you are unsure or are having problems, consult your lab instructor to insure that you are not inadvertently damaging the equipment. Don’t be afraid or embarrassed to have the lab instructor check your work before going on to another step.

Write a Review

Computer Network Security Questions & Answers

  Role of ethics in developing the certification package

Description of the role of ethics in developing the certification package and Description of how to represent the required documentation and requirements in the certification package

  What is net neutrality and why is it so important

What is Net Neutrality and why is it so important for organizations today?

  Differences between viruses and other malicious codes

differences between viruses and other malicious codes

  What is the keyspace of the one-time pad for a ciphertext

Encode to this message and the key as bits. Encrypt with the one-time pad using XOR. What is the resulting ciphertext?

  Create diagram of dsl and cable modem connection to your isp

Create a diagram of the DSL and Cable Modem connections to your ISP, cable organization, and telecom to your home router using Visio or its open source alternative software.

  What are some of the considerations and issues

Discuss key management techniques. What are some of the considerations and issues? Give at least two examples of key management techniques.

  Analyse potential attacks and give a method of prevention

Write a key transport protocol for them to establish a session key. Analyse potential attacks and give a method of prevention. Implement it using Pari/GP.

  Create a prescriptive section of your playbook

Create a prescriptive section of your playbook providing guidelines to secure each of these areas - Network connections and Mobile devices

  Discuss in detail one vulnerability analysis tool

Discuss in detail one vulnerability analysis tool that is suitable for this (deployment) environment -  You have the liberty to consider open source or free products such as OpenVAS.

  List several software security concerns associated writing

List several software security concerns associated writing safe program code. Identify several concerns associated with the use of environment variables/

  Use of keys to communicate when alan sends private message

Alan and Beatrice are both users of (PKI)also called public key infrastructure. Describe how they use their keys to communicate when Alan sends a private message to Beatrice

  Identify steps required for implementing a physical security

Analyze the design process for defining a customized security solution. Give your opinion as to which step in this design process is most significant. Identify three steps required for implementing a physical and environmental security program.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd