If I were to be hired as a consultant to perform a network security assessment for a large firm, there are a few things that I would have to keep in mind to provide my client with the best outcome possible. I would fist begin by explaining what a security risk assessment is to the client. I will explain that the security risk assessments that will be utilized is basically used to recognize the chance that there is an openness that can be exploited in their IT systems. We will begin by first determining the likelihood that a threat such as a hacker or an error will try to abuse the weakness and then determining the probability that the attempt will be successful. There are seven steps in which the Footprinting and scanning is divided by the EC-Council (Krutz and vines 2010). They are Gathering the information, The network range determination, Active machine identification, Discovering the access points and open ports, Operating System(OS) Fingerprinting, Fingerprinting services and Mapping of the network Blogspot (2011). In order to start this process, I will have to be focusing on techniques such as Footprinting and Scanning of the organization. I would explain to my client that the process of Footprinting is the gateway in data gathering of hackers. In order to achieve or prevent an effective attack or intrusion, we would need to collect data. When a hacker is trying to hack a company or an individual’s data their motive is to learn all facets of the establishment 's security position. They also want to profile the Intranet that they possess, their remote access abilities, and intranet/extranet presence. I will clarify to the clients that Footprinting is the method of using numerous implements and equipment to comprehend and study the best approach to attack a given objective. Enemies observe as much as possible without really exposing themselves. They would usually try to find information that
References: Blogspot (2011). Network Foot printing. Retrieved from http://securing-the- internet.blogspot.de/2011/05/network-foot-printing-technique-of.html SANS Institute (2013). Footprinting: What Is It, Who Should Do It, and Why? Retrieved from https://www.sans.org/reading- room/whitepapers/auditing/footprinting-it-it-why-62