1) After conducting a zone transfer and running security tools on the Alexander Rocco network, you’re asked to write a memo to the IT manager, Bob Jones, explaining which tools you used to determine the services running on his network. Mr. Jones is curious about how you gathered this information. You consult the OSSTMM and read Section C on port scanning and the “Internet Technology Security” section, particularly the material on identifying services, so that you can address his concerns. Based on this information, write a one-page memo to Mr. Jones explaining the steps you took to find this information. Your memo should mention any information you found in the OSSTMM that relates to this stage of your testing.
2) Security Consulting Company, which has employed you as a security tester, has asked you to research any new tools that might help you perform your duties. It has been noted that some open-source tools your company is using lack simplicity and clarity or don’t meet the company’s expectations. Your manager, Gloria Petrelli, has asked you to research new or improved products on the market. Based on this information, write a one-page report for Ms. Petrelli describing some port-scanning tools that might be useful to your company. The report should include available commercial tools, such as Retina or Languard, and their costs.
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps
- You are a senior information security manager for a federal agency. You received a phone call from an employee stating that his laptop was stolen from his workstation. He tells you that the laptop has at least 30 cases with Social Security numbers of individuals he has been working on. How would you handle this security incident? What is the first thing you should do? How would you retrieve/destroy the data? You may have an internal thief—what would you do to find out who stole the laptop? What security violations have been committed? How would you prevent this from happening again?arrow_forwardIt is essential to offer an explanation of the function that firewalls serve to play in the context of the defense and safety of computer networks. It is important to remember to include a definition of the word as well as specific examples and facts that highlight the value that it brings to the organization.arrow_forwardQuestion 5 (practical): A government agency where you are currently employed has claimed that one of their servers has been slowed. The primary responsibility of this server is to provide web-based access to internal users. They captured network traffic after some investigation to aid in the analysis of any suspicious activities. In addition, they agency asked you as the cybersecurity expert to do this job by analyzing the captured network traffic. You should examine the file "MCBS.pcap". Then you may be required to answer the following questions. a) Type of attack b) IP address of sender c) IP address of recipient/server d) Which port number(s) used? e) Any suggestion to mitigate?arrow_forward
- How do the horizontal and vertical authorization layers promote a defense-in-depth strategy? Describe the steps through the vertical and horizontal layers for a single web request.arrow_forwardThe most important aspects of the a.NET security standards are discussed. The Microsoft.NET security website, the OWASP GitHub page, and any other reputable sites are all excellent places to begin your investigation.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education