Preview

Security Assessment

Good Essays
Open Document
Open Document
856 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Assessment
Assignment 1: Security Assessment

If I were to be hired as a consultant to perform a network security assessment for a large firm, there are a few things that I would have to keep in mind to provide my client with the best outcome possible. I would fist begin by explaining what a security risk assessment is to the client. I will explain that the security risk assessments that will be utilized is basically used to recognize the chance that there is an openness that can be exploited in their IT systems. We will begin by first determining the likelihood that a threat such as a hacker or an error will try to abuse the weakness and then determining the probability that the attempt will be successful. There are seven steps in which the Footprinting and scanning is divided by the EC-Council (Krutz and vines 2010). They are Gathering the information, The network range determination, Active machine identification, Discovering the access points and open ports, Operating System(OS) Fingerprinting, Fingerprinting services and Mapping of the network Blogspot (2011). In order to start this process, I will have to be focusing on techniques such as Footprinting and Scanning of the organization. I would explain to my client that the process of Footprinting is the gateway in data gathering of hackers. In order to achieve or prevent an effective attack or intrusion, we would need to collect data. When a hacker is trying to hack a company or an individual’s data their motive is to learn all facets of the establishment 's security position. They also want to profile the Intranet that they possess, their remote access abilities, and intranet/extranet presence. I will clarify to the clients that Footprinting is the method of using numerous implements and equipment to comprehend and study the best approach to attack a given objective. Enemies observe as much as possible without really exposing themselves. They would usually try to find information that



References: Blogspot (2011). Network Foot printing. Retrieved from http://securing-the- internet.blogspot.de/2011/05/network-foot-printing-technique-of.html SANS Institute (2013). Footprinting: What Is It, Who Should Do It, and Why? Retrieved from https://www.sans.org/reading- room/whitepapers/auditing/footprinting-it-it-why-62

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    CHAPIN, L. 1992. The Internet Standards Process [Online]. IEFT. Available: https://tools.ietf.org/html/rfc1310 [Accessed 10th April 2016].…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially undetectable. Very little information has been publicly discussed about arguably one of the least understood, and most significant stages of penetration testing – the process of Passive Information Gathering. This technical paper and information gathering plan reviews the processes and techniques related to the discovery of leaked information. It also includes details on both the significance of the leaked information, and steps organizations should take to halt or limit their exposure to this threat.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    When performing risk assessment procedures and related activities to obtain an understanding of the client and its environment, the auditor shall obtain an understanding of the following:…

    • 1596 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    5. What does the enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Business Case

    • 2402 Words
    • 10 Pages

    Intelligent Imaging Solutions (IIS) is a public corporation that is headquartered in Dallas, TX, that competes in the global market for consumer navigation systems (GPS) and in the military defense industry. Their organization consists of two divisions. The first division produces products for consumers and the second division produces products for the military. For consumer products Intelligent…

    • 2402 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    This request will be based on the Security Controls Assessor-Validator (SCA-V) pre-assessment that was done in February of the ECC. As a result of the assessment there were a lot of violations identified, but the team has worked to get them corrected. However, some will require the purchase of additional hardware. I should have the list this afternoon, and will forward it to you ASAP. The follow-up inspection is scheduled for 13 June.…

    • 74 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 1 2 NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 3 Oral Assessments Skills Assessment Interview • 15% of the course total The questionnaire consists of • 15 sets of questions • 3 questions in each set…

    • 4261 Words
    • 28 Pages
    Good Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    The data theft identified by the various organizations is not uniform. Some of the steps that can be implement by organizations such as:…

    • 401 Words
    • 2 Pages
    Good Essays
  • Good Essays

    What Nathaniel Bacon did has been in question for years. Some people agree with his actions while others think it was unnecessary. The research included in this essay will educate the reader on the important aspects of Nathaniel Bacon’s life. The information will explain who Nathaniel Bacon was, what he did that made him so well known today, why he did what he did, and what the results of these actions were.…

    • 754 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This is why it is best if we outsource our vulnerability assessment project. Even though we know how to do an assessment, we will not know as much as a professional who do just that everyday. So, since this project is so critical it is best that we outsource it to an experience professional with a good reputation.…

    • 214 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Undocumented networks are extremely common. Many times this is related more to the difficulty of keeping the documentation up to date rather than to the difficulty of the documentation process itself. Many LAN Administrators had big dreams at one time of keeping elaborate drawings detailing every last aspect of the network. However, networks tend to change too frequently for such drawings to stay current. In spite of the difficulty, having a well documented network can help you solve problems quickly when they arise and is vital to the overall security of your network. In this article, we’ll discuss some alternative documentation methods that are more practical in the ever changing world of networks.…

    • 1165 Words
    • 5 Pages
    Powerful Essays