Preview

AIS Homework

Good Essays
Open Document
Open Document
499 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
AIS Homework
I believe it is important IT governance committees are compromised of top level managers because of the competence of the personnel. You do not want just anyone on the street coming in and working in your IT department. Top level managers are usually giving their roles because they are able to lead and no their job well. Managers would be able to feel out who s suitable for the position for the IT department rather than just one person in the IT department getting someone the job just because they know them. I believe a group of top managers who agree on someone to be a integral part of the IT department would have a better chance of finding the right people for the job rather than just a regular manager.
54. (SO 2) Using a search engine, look up the term “penetration testing.” Describe the software tools you find that are intended to achieve penetration testing. Describe the types of systems that penetration testing is conducted upon.
The software tools that I was able to find were:
Metasploit is an open source platform for developing and testing exploits. It's available for both Unix and Windows systems. This is a far more advanced tool than the others on this list, and requires more programming knowlege to run and use. The advantage is that a specific exploit can be fully demonstrated to exist, rather than noted as a potential vulnerability. This platform runs payloads, shellcode, and remote shells--you will actually penetrate the target. Servers can and will crash!
Nessus -Tenable Network Security offers Nessus as a free scanner for non-commercial use, with a subscription license required for commercial organizations. Nessus has long been a favorite vulnerability scanner for people due to its speed, accuracy, and depth. Large vulnerability libraries can mean long times for scans. Currently there are over 28K plugins available, with automatic updates possible for new plugins. Nessus 4 is one of the fastest scanners used.
Nikto is an Open Source web server

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ACBII Homework 1

    • 617 Words
    • 2 Pages

    Run all of the samples on a gel. Analyze the results as described in step 1.…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 1 for CS105

    • 1662 Words
    • 5 Pages

    Jean, a former pharmacist, is now the network administrator for the LM Pharmacy in the town of Paris, Virginia. His duties include enabling the electronic transfer of information between health care providers (i.e., doctors and hospitals), patients, and the pharmacy itself. One of Jean’s most important responsibilities is to protect health information in accordance with federal law and the pharmacy’s privacy policy.…

    • 1662 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Sociotechnical systems theory was created by researchers in human relations in the early 1950s. They found the two were important and needed for the effectiveness of businesses could reach higher potential when they focused on having the internal workplace and the external of the business (the customers) all uniform. Sociotechnical systems theory is when organizations are effective. This is broken down into two parts: social and technical. The employees make sure they follow orders correctly are the social part. The technical part is having right training knowledge and tools so the business can be productive and effective in making sure the customers are happy and return consistently. Social technical systems theory was started being used by Japanese companies which integrated technical systems and management to achieve high performance. Large U.S. automakers like Ford and Chrysler also started to look this way. They wanted to understand how the Japanese were applying these tactics to make their business and their products achieves.…

    • 711 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    4. Nessus® provides useful and up to date software vulnerability assessment and suggested remediation plans via updates and plug-ins. Nessus® can help security practitioners with shrinking the software vulnerability window with up to date software patching and security updates.Nmap (ZeNmap GUI) provides security practitioners with an easy to use, automated network discovery and inventory management tool. Nmap can provide a quick reconnaissance and prove of an IP network infrastructure and allows for more targeted software vulnerability scans performed by Nessus®.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    8. Once vulnerability is identified by Nessus, where can you check for more information regarding the identified vulnerability, exploits, and the risk mitigation solution?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    EXAM 5 AIS

    • 1909 Words
    • 18 Pages

    Which of the following is conducted as a follow up to a system's recent implementation?…

    • 1909 Words
    • 18 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    UNIT 2 HOMEWORK 2012

    • 908 Words
    • 4 Pages

    DIRECTIONS: In your notebook, identify the terms and answer the questions for each chapter. Make sure to number correctly and use specific details. This will be due the day of your Unit Multiple Choice Test on the chapters.…

    • 908 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    AOSC200 MIDTERM

    • 969 Words
    • 4 Pages

    What is the carbon dioxide and hydrologic cycles? What are the sources and sinks of each?…

    • 969 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    One such program is called metasploit. This program is used by cyber security personnel to help advise clients of possible vulnerabilities against their own systems. Metaslpoit is owned by Rapid7, who provides security data and analytic…

    • 838 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    AIA105 Assignment Two

    • 1496 Words
    • 4 Pages

    If we attempt to define slaves or slavery we would conjure up notions of force, control, physical and psychological punishments brought on by a person or persons of higher authority. They are looked at and labelled as humans that are not worthy to be at the level of which their “masters” contain, thus the capability to provide physical force, poor nutrition and physical health and to justify it. Associating this stereotype of slavery to that of the convicts transported to Australia between 1788 and 1850, we could find many similarities. The past lives each individual lead, whether it be as a slave or a convict, can initially be perceived as degrading and a slow progress of deterioration of the mind and body. Once researching and finding more on each of the topics I was able to gain a clearer understand of both, enabling great comparison and debate.…

    • 1496 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    AIS Chapter 3 P 3-7

    • 416 Words
    • 2 Pages

    Use the Internet to locate www.CIA.Gov and www.Amazon.com. Find the privacy and security policies for each. Compare and contrast the use of privacy statements, encryption, SSL, and cookie policies.…

    • 416 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 3

    • 680 Words
    • 3 Pages

    Although many organizations have reduce significant number of design and coding defects through software development lifecycle; there still remains security holes that arise when an application is deployed and interacts with other processes and different operating systems (Cobb, 2014). Another reason that penetration test is critical is many Payment Card Industry Data Security Standard (PCI DSS) mandate internal and external penetration test (Cobb,2014).…

    • 680 Words
    • 3 Pages
    Good Essays

Related Topics