Using E-mail Address to Determine Network Operating System

Assignment Help Basic Computer Science
Reference no: EM133162476

Case 1: Using an E-mail Address to Determine a Network's Operating System

Alexander Rocco Corporation has multiple OSs running in its many offices. Before conducting a security test to determine the vulnerabilities you need to correct, you want to determine whether any OSs are running that you're not aware of. Christy Fitzgerald, the network administrator/security officer, is resistant to giving you information after he learns you're there to discover network security vulnerabilities. He sees you as a threat to his position. 

Questions:

a. What tools might you use after learning Mike's e-mail address?

b. What can you determine by entering Mike's e-mail address into Google? What about just the handle "vetman2601"?

c. Could the information you learned from Google be used to conduct vulnerability testing?

d. Write a memo to the IT manager, Bob Jones, about the potential issues with running a old RHEL 5.8 server, and mention the importance of patch hygiene. Make sure your memo explains how you gathered this information and offers constructive feedback. Your memo shouldn't point a finger at any company employees; it should discuss problems on a general level.

Case 2: Using Dumpster-Diving Skills

You have observed that Alexander Rocco Corporation uses Alika's Cleaning Company for its janitorial services. The company's floors are vacuumed and mopped each night, and the trash is collected in large bins placed outside for pickup on Tuesdays and Fridays. You decide to visit the dumpster Thursday evening after the cleaning crew leaves. Wearing surgical gloves and carrying a large plastic sheet, you place as much of the trash on the sheet as possible. Sorting through the material, you find the following items: a company phone directory; a Windows NT training kit; 23 outdated Oracle magazines; notes that appear to be programs written in HTML, containing links to a SQL Server database; 15 company memos from key employees; food wrappers; an empty bottle of expensive vodka; torn copies of several resumes; an unopened box of new business cards; and an old pair of women's running shoes.

Question

a. Based on this information, write a report explaining the relevance these items have. What recommendations, if any, might you give to Alexander Rocco management?

Reference no: EM133162476

Questions Cloud

Vulnerability Management project : For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
Cybersecurity software : During job interviews, employers often ask if you are familiar with cybersecurity software.
Contingency plan : Discuss a CIRT plan, which is often used as a contingency plan for the KION Group. Discuss the relationship between a CIRT plan and risk management.
Topologies and OS vs NOS : Explain five major networking differences between Windows Server and any of the Linux editions and releases. Describe the topology?
Using E-mail Address to Determine Network Operating System : Based on this information, write a report explaining the relevance these items have. What recommendations, if any, might you give to Alexander Rocco management?
Foundations Of Emergency Management : Why is evacuation planning so difficult? What kinds of things can go wrong during an actual evacuation?
Systems development life cycle and security life cycle : Discuss the differences between the systems development life cycle (SDLC) and the security life cycle.
System updates needed to complete this solution : What do you think is the best solution to address this potential error? What are the device changes or system updates needed to complete this solution?
Important step in dissertation is theoretical basis : An important step in a dissertation is the theoretical basis that might help explain and shed light on why the problem is happening

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Contingency planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual'.

  Describe a hypothetical situation

Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective

  Write the four equations in matrix form

Write the four equations in matrix form and change the order of input terms to even and odd order to develop the DIT matrix algorithm.

  Compare and contrast static scoring of the budget

Compare and contrast static scoring of the budget with dynamic scoring when it comes to evaluating the effect of a policy change.

  Why can qc be considered part of qa

According to the IEEE definition of SQA, quality control (QC) is not equated with quality assurance (QA).

  Any tactics to reduce negative connotations

What happens to the organizational climate when this resistance occurs and any tactics to reduce negative connotations when dealing with change.

  Information and communication technology

You are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

  Threat modeling technique

STRIDE is a popular threat modeling technique commonly used to discover the security weaknesses of a software system.

  Monopsony marginal expenditure

1) What is the monopsony's marginal expenditure (ME) curve? 2) What is the monopsony's marginal value (MV) curve?

  Why is the data type for the postal code field char

In Example 1, why is the data type for the Postal Code field CHAR and not SMALLINT or INTEGER? Is the length of the field long enough? Why or why not?

  What type of encryption would be the most appropriate

To secure files on your computer so they are unreadable to a hacker who might gain access to your computer, what type of encryption

  Prefix of accessor and mutator methods

Classes should start with a capital letter and get and set should be used as the prefix of accessor and mutator methods, why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd