How many locations does acxiom have active or open

Assignment Help Computer Network Security
Reference no: EM132159580

Lab - Information Recon

Objectives - To learn how to use some of the tools used by hackers to gather information about a potential target, using different techniques on varied targets to improve the chances of success when attacking and/or compromising the site.

Lab Outcome:

  • To complete the lab procedures To correctly answer the questions supplied in the lab
  • Each question is worth one mark, no partial marks.

Background information: The capabilities and tools you will be using in this lab should not be used either on the Algonquin Corporate network or any other network connection without explicit authorization from the network administrator. Otherwise, you risk being mistaken for an attacker on that network!!

Section A - Preliminary Information

However, a large portion of the tools needed are in the Kali VM already.

Other similar tools and resources are available and can be used.

Just make sure you list what tools and/or sites you did use for each answer given.

Section B - Information from public records

Your goal here is to find information about Algonquin College.

Locate and identify the following information about Algonquin College.

Q1. What is name, email address and mailing address of the main administrative contact for the algonquincollege.com domain? Provide source of information.

Q2. What information is seen in Q1 about the admin that is a security risk? Explain why & provide an alternative.

Q3. Who's the domain registrar for the algonquincollege.com domain? Provide source of information.

Q4. Where are the DNS servers physically located for Algonquin? Provide source of information.

Q5. What are ALL of the official/real algonquincollege.com DNS server IP(s)? Provide source of information.

Q6. What are ALL of the official/real algonquincollege.com mail server IP(s)? Provide source of information.

Q7. What is the public IP address range(s) owned by Algonquin College? Provide source of information.

Q8. What specific web server software(s) does algonquincollege.com use, and associated IP addresses for the main web page?

Q9. Which country has the highest percentage of visitors that have gone to the main algonquincollege.com web site?

Algonquin has multiple campuses

Ottawa, Perth, Pembroke

Q10. Is Algonquin hosting the info sites locally (i.e. same servers as main) or not? Explain how you know.

Section C - Information research about a company

Your goal here is to learn information that you can gather about an organization.

Some guiding principle you can use:

If the company is publicly traded, that means they are mandated by some level of Corporate Governance to publish corporate info, Investor info and other key tidbits.

In the US, SEC filings for corporations contains a wealth of corporate info

Can be quite different in other countries, the details of Corporate governance and compliance varies from country to country.

If the company is incorporated, the process and laws require that key info be made public.

  • A lot of the "About us" or "News" pages have a wealth of information available
  • This is especially true if it isn't just a sole proprietorship incorporated just for tax purposes and/or an International company.

Most companies WANT to talk about themselves.

  • Marketing and PR is built into corporate culture, fed by human ego and the need to tell others what you do and how well you do it.
  • It's typically a rather painful and ongoing exercise for the CSO to turn around and verify what's put out and public info... and what's out there that shouldn't be!!
  • Companies are typically information gluttons, to better understand their market and demographics. Privacy then works to ensure that non-public info companies acquire is maintained in an appropriate fashion... but...

Q11. How many people total are on the Acxiom's Board of Directors?

Q12. How many locations does Acxiom have active/open?

Q13. List 3 specific companies BY NAME that Acxiom does business with.

Section D - Information research in News Groups

Your goal here is to learn information that you can gather from Google searches about a problem an organization may be having.

Find information about a VPN problem that may have occurred for a company (or a client of the company) with a domain name of gtscad.com, question put out there by John Chapman.

Q14. What information did you find, specifically? Copy the content of the post(s) here.

Q15. What specific newsgroup(s)/forum(s) was the information posted to?

Q16. With what you know about the incident, people and companies involved, data mine (OSINT) and list any-and-all key "public" technical information you can find based on the person(s) involved and the company. (3-5 key elements minimum each to get full marks).

Q17. What should John have done to protect this information / public info from being used against his firm? Explain.

Section E - Information gathering about ... you!

Okay, using the techniques and tools you've used above, research and gather as much of the information you can find on the web about ... you!

Q18. Document everything of relevance that you found about yourself, along with where and how.

And "I didn't find anything" doesn't cut it WITHOUT strong justification - remember, I might check.

Q19. Was the first occurrence you found really about you ... or someone else with same name? Try and explain why.

Q20. How easy was it to find specific and relevant information about the actual you? Explain.

Q21. Based on what you have found and how, what kinds of details are necessary to ensure that researching an individual obtains both accurate results AND about the right person?

Section F - Data Mining - the quick demo

One example of a data mining tools is called Maltego.

Once that's done, start Maltego

  • When prompted, enter your username, password, and any other required information.
  • Be patient - the program can take a while to start up.
  • In the left-hand window, near the bottom, drag and drop a Person into the Mining View pane.
  • Double-click on the new Person icon and change the name to your own name.
  • Right-click on the changed icon and select All Transforms to start the data mining process.

Q22. Did Maltego come up with new information/relationships you had not found before? Elaborate - what kind, how relevant, etc...

Q23. How accurate are the relationships Maltego found about you? Explain.

Attachment:- Assignment File.rar

Verified Expert

Given task is based on the information gathering topic of cyber security. In which total 3-4 seanario was given. Based on given reference details, information related to domain , information related to name and information related to company was determined and questions were answered.

Reference no: EM132159580

Questions Cloud

Where could you get this media : Where could you get this media? Is it OK to copy whatever clip-art you find on the web? Why or why not? Is it OK to use part of your favorite song?
What effect does diversity have on a group : Describe some of the advantages or disadvantages of having a diverse environment as it relates to employee relations. In what ways does conflict facilitate.
Exploratory research play in marketing research process : What role does exploratory research play in the marketing research process? How does exploratory research differ from other forms of marketing research?
Finding the right employee for the right job is a complex : Human resources managers have to review applications and select those who have the qualifications and may be the right fit.
How many locations does acxiom have active or open : CST8230 Lab - Information Recon - To learn how to use some of the tools used by hackers to gather information about a potential target
Kind of challenges may google face in the future : What kind of challenges may Google face in the future?
The world in different countries and different cultures : How does a Japanese company like Toyota manage quality around the world in different countries and different cultures?
Analyze two career options in the health care industry : Analyze two career options in the health care industry, in terms of the educational requirements, job responsibilities, and average salaries.
How the host government may affect strategic implementation : Explain how the host government may affect strategic implementation in an alliance or another form of entry strategy.

Reviews

len2159580

11/4/2018 8:44:38 PM

Lab Deliverables - Answers submitted back to Blackboard by the date indicated on the course calendar. Answers to each question must follow each question. Submit the entire document to Blackboard. Change the colour of you answer text to DARK BLUE. I will deduct three marks if you don’t do this. All submissions must be in PDF, one file submission per student. All of this lab exercise may be performed outside the lab.

len2159580

11/4/2018 8:44:31 PM

Do NOT forget to quote your sources for each answer – you will not get marks without them! Follow these procedures carefully. If at any time you are unsure or are having problems, consult your lab instructor to insure that you are not inadvertently damaging the equipment. Don’t be afraid or embarrassed to have the lab instructor check your work before going on to another step.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd