Attack Methodology and Countermeasures assignment
Think about that a native firm has employed you as a penetration tester to carry out needed testing. The corporate has requested you to report again to the Board of Administrators in your findings. You have got free reign to make use of no matter instruments which can be at your disposal. Word: You aren’t performing an precise penetration check or making a penetration check report for this assignment.
Write a two to 4 (2-Four) web page paper wherein you:
Analyze each the scanning methodology that you can use and the countermeasures that an organization or group may use in an effort to thwart such scanning makes an attempt.
Analyze the important thing instruments accessible for scanning a community. Advocate one (1) scanning device for a hacker and one (1) scanning device for a safety administrator that you simply imagine present the best safety for a community. Point out which of the chosen instruments is most useful to you because the penetration tester. Present a rationale in your response.
Assess the general significance of the 5 (5) main phases of an assault. Choose the section(s) that you simply imagine to be a very powerful for a safety administrator to guard in opposition to. Present a rationale in your choice.
Counsel the important thing countermeasures that a safety administrator may take in an effort to shield an organization’s property from Trojans, viruses, and worms, and impede additional harm of an assault. Present a rationale in your response.
Use at the very least three (three) high quality assets on this assignment. Word: Wikipedia and related Web sites don’t qualify as high quality assets.
Your assignment should comply with these formatting necessities:
Be typed, double spaced, utilizing Instances New Roman font (measurement 12), with one-inch margins on all sides; citations and references should comply with APA or school-specific format. Verify together with your professor for any extra directions.
Embody a canopy web page containing the title of the assignment, your identify, the professor’s identify, the course title, and the date. The duvet web page and the reference web page should not included within the required assignment web page size.
The particular course studying outcomes related to this assignment are:
Talk about the ideas of moral hacking, various kinds of hacking, and penetration testing methods.
Describe footprinting and passive data and aggressive intelligence gathering.
Clarify the various kinds of scanning and scanning methodology.
Describe enumeration and totally different methods used for enumeration.
Study the capabilities and impression of malicious applications and their countermeasures.
Use know-how and data assets to analysis points in moral hacking.
Write clearly and concisely about matters associated to Perimeter Protection Methods utilizing correct writing mechanics and technical fashion conventions.