Preview

IS4560 Unit 3 Assignment 1: Information Gathering Plan

Satisfactory Essays
Open Document
Open Document
501 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4560 Unit 3 Assignment 1: Information Gathering Plan
IS4560
Unit 3 Assignment 1
Information Gathering Plan
The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.
However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially undetectable. Very little information has been publicly discussed about arguably one of the least understood, and most significant stages of penetration testing – the process of Passive Information Gathering. This technical paper and information gathering plan reviews the processes and techniques related to the discovery of leaked information. It also includes details on both the significance of the leaked information, and steps organizations should take to halt or limit their exposure to this threat.
There are a number of techniques and processes available when carrying out a Passive Information Gathering exercise. A lot of important information can be passively harvested and subsequently used in a direct attack or to reinforce other attacks targeted at an organization. Depending upon the source, information such as current service patching levels, internal network

You May Also Find These Documents Helpful

  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Security implementation responsibilities focus on implementing the access controls and account management processes outlined in this Plan. The following positions are responsible for security implementation:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 1 Assignment

    • 1325 Words
    • 6 Pages

    In all, Figure 4 shows a calculation of 64% accuracy rate for correct answers given in his small reading group. I could tell that Michael felt like he was on a roll, and he made a surprising request that none of his peers groaned about. “Can we finish by ourselves?” The teacher gave consent for the class to finish independently, and they did. As an added bonus, the reading specialist shared an entire sheet of heart stickers made by her husband to celebrate Valentine’s Day early. Michael happily received his reward while trying to estimate the total stickers on the sheet (see Figure 5). When he saw the red heart, he stated, “I don’t want the heart to camouflage on my red sweater.” Therefore, Michael placed the heart on his white collar (see Figure 6).…

    • 1325 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Is3350 Unit 1 Assignment

    • 653 Words
    • 3 Pages

    1. Once I have completed my current courses I will apply for TPP mathematics level C or enrol in an Accounting degree.…

    • 653 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information gathering is a key element when you are trying to find some hidden data about someone, a company, or even a school. In a university, I could determine what the internet protocol address range by going to a web browser and typing in WHOIS in the search engine. Afterwards I would click the WHOIS link and it will take me to a screen with a text search box where I would put in the domain name of the university and hit search. Then I should see the results and it will give me the university’s IP addresses in a range from beginning to end. If I wanted to retrieve data from the Domain Name System, I would log into one of their networks and go to the command line interface and use the nslookup command tool that will allow me to retrieve information from the DNS server saying what is the current server I am currently on and its IP address. In addition I could get more information just by using the nslookup…

    • 480 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The best security policies would be program-framework and system-specific policies the reason for implementing a program-framework policy is to make sure that a system fits in the overall structure of the business and see if the implemented security program provide the company with an organization-wide direction. The system-specific policy will provide everyone with the purpose, scope, responsibilities, and compliance needed to achieve a secure system.…

    • 608 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Recognizing these threats affect national businesses and research institutions because valuable and sensitive information is being stored at an increasing rate online. Accessing this data is easily accomplished through unauthorized breaches of computer systems. With the increase of sensitive information being stored online, foreign nations and third-party actors such can conduct cyber-attacks on those systems without detection.…

    • 887 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 749 Words
    • 3 Pages

    Covering tracks—The process of deleting log file entries to make it appear that you were never on the exploited system…

    • 749 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    [2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),” http://www.gartner.com, 2010.…

    • 1821 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The number of articles found, discussing and reporting the threat to information security were four. A brief summary of each is given as follows:…

    • 2132 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cybercrime

    • 12864 Words
    • 52 Pages

    presentation was prepared by me specifically for this class and has not been submitted, in…

    • 12864 Words
    • 52 Pages
    Good Essays