Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Module Overview

Why are security controls important to an organization and its network security? Security controls are the mechanisms used to safeguard an organization's data. When these controls are being created, many factors must be considered:

• Who will have access to the data?
• Will a user be able to access data from a remote location?
• Where will information be stored?
• What kinds of devices will be allowed to access the data?

The labs in this module will be a great starting place to explore how an attacker gains access to an organization's data. An attacker has several reconnaissance steps in order to gain information about a user, organization, agency, or business. The process can include footprinting, social engineering, network enumeration, and port scanning. The initial step of information gathering is called footprinting, which is the process of gathering as much public information that is available about an information system. Footprinting gathers any information about domain names, services, scanning for open ports, remote capabilities, and any evident security controls. This process usually takes place in the form of open-source footprinting, and the information is often garnered from a public website that is accessed legally. Typically, footprinting is accomplished through a whois query to inquire public documents. After someone has completed footprinting, that individual often uses social engineering to gain access to an organization's network. Network enumeration is the process of probing and discovering domain names in a nonintrusive manner. Typically, network enumeration is identified through searching the internet and determining any networks attached to them. The results obtained can be used by a hacker to gain access to an organization's network. Finally, port scanning will identify communication outlets that can be exploited and how particular aspects of company information can expose the organization to hacking.

After engaging in the virtual activities in this module, you will have a better understanding of how hackers can exploit company information and how this information informs the development of security and response policies, security controls, and response mechanisms that can help address vulnerabilities.

While there is a discussion activity that will allow you to talk with your peers and instructor about any key points or questions, the two labs in this module should be your focus.

Learning Objectives

By the end of this module, you will meet these learning objectives:

• Appraise risk or vulnerabilities when accessing the organization information system or network
• Diagnose network security posture using Zenmap and OpenVAS
• Uncover available open ports that could be a security risk

Plan at a Glance

This is the recommended plan for completing the reading assignments and activities within the module. Additional information can be found in the module Reading and Resources section and in the task list.

8. Read Chapter 1, review the related lab presentation, and complete the lab. Post any questions or comments about the lab in the optional forum.

9. Read Chapter 2, review the related lab presentation, and complete the lab. Post any questions or comments about the lab in the optional forum.

Reading and Resources
Required Resources

Textbook: Hacker Techniques, Tools, and Incident Handling, Chapters 1 and 2

Presentations: Footprinting and Social Engineering (Lesson 1) and Port Scanning, Enumeration, and System Hacking (Lesson ¬2) Review these lecture presentations through the Jones & Bartlett lab environment.

The footprinting process involves gathering information about domain names, services, scanning for open ports, remote capabilities, and any evident security controls.

Attachment:- Lab.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92463403

Have any Question?


Related Questions in Computer Network & Security

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Assessment taskstarting from the logical network design

Assessment Task Starting from the logical network design that you completed in Assessment Item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As