How much information is available to potential hackers

Assignment Help Computer Network Security
Reference no: EM13313505

Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers. Some organizations do this using internal staff; however, it is much more common to see organizations hire external security consultants to perform these types of security reviews. This allows a truly unbiased outsider to attempt to gather as much information as possible to formulate an attack.

Assume that you have been selected as the security consultant to perform a comprehensive security review for an organization of your choosing. Ensure that the organization that you select has a public website that you can access and at least one web application that you can use for this task. You will review the security of the organization's website and any related web applications and consider security risks such as structured query language (SQL) injection and social engineering techniques.

To complete this task, you will need to perform a footprinting analysis of your selected company. Your comprehensive security review will involve a series of tasks that are described in detail below.

Note: Task 3 only requires "Passive" Footprinting and a discussion on SQL injection. At no time during the execution of this task should any connection be made to the Footprinting target. If you have any questions please contact the course mentor.

Task:

A. Create a multimedia presentation (e.g., PowerPoint, Keynote) (suggested length of 12-15 slides) in which you do the following:

1. Summarize your findings of a footprinting analysis you performed on your chosen organization.

2. Discuss how the information gathered during your footprinting analysis could be used to initiate an attack against the organization.

3. Discuss social engineering techniques that could be utilized to gather information regarding the organization's computer systems.

a. Present appropriate countermeasures that should be used to combat such social engineering techniques.

4. Prescribe a series of countermeasures and remedies that could be utilized to counter this type of footprinting attack.

5. Present common web server vulnerabilities that the organization is most susceptible to.

6. Present common threats against web applications that pose the greatest risk to the organization's web applications.

7. Illustrate how SQL injection could be used to obtain or destroy information from a web application's database.

8. Discuss how SQL injection techniques could pose a potential threat to the organization's web applications.

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

B. When you use sources, include all in-text citations and references in APA format.

Reference no: EM13313505

Questions Cloud

Which have user profiles that are available for transfer : Which have user profiles that are available for transfer?
The functions square and double take a single int parameter : The functions square and double take a single int parameter and return an int result.The function compute takes a value n and a function f, and returns the result of calling that function f with n as its parameter.So, compute(3,square) evaluate..
Provide kitchen staff with the functionality to display orde : Owners and managers have the ability to keep track of the inventories, quantities and item prices with additional functionality which allows for future orders to be implemented as required.
Construct an annotated bibliography : Construct an annotated bibliography - Are corporations obliged to help combat social problems or is factory farming morally justifiable?
How much information is available to potential hackers : Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers
Calculate the youngs modulus of this tendon : A 14.4 cm long tendon was found to stretch 3.79 mm by a force of 11.1 N. Calculate the Young's modulus of this tendon
Find the final speed of both vehicles after the collision : A 650-kg car stopped at an intersection is rear-ended by a 1720-kg truck moving with a speed of 22 m/s. find the final speed of both vehicles after the collision
Company called aphrodite it staffing solution : Based on a company called Aphrodite IT staffing solution,
What is the total time spent in the system by all vehicles : Vehicles arrive at a toll bridge at a rate of 430 veh/hr (the time between arrivals is exponentially distributed) Two toll booths are open and each can process arrivals (collect tolls) at a mean rate of 10 seconds per vehicle

Reviews

Write a Review

Computer Network Security Questions & Answers

  List three key things employees remember on data privacy

List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which draws someone to look at it while still maintaining professional appearan..

  Exchange keys out of band in symmetric encryption

In symmetric encryption, why is it significant to exchange keys "out of band"? Write down the difference between "digital signature" and "digital certificate"?

  Describe what security threats in installing wireless lan

Write a two- page letter to describe what security threats she is facing and how she can decraese these threats. Remember that you are writing for friend, not for a teacher.

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  How will ad organizational units be organized

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  Create a threat model for your own blog setup

Create a threat model for your own blog setup. Additionally, explain the purpose of building a threat model, and how it applies to this case.

  Computer forensics investigation

After a computer forensics investigation, you require to meet with your section or group of fellow investigators and critique the case in an effort to improve your work.

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

  What are some benefit of a feistel structure

How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd