Preview

Software Testing and Better Protect Companies

Satisfactory Essays
Open Document
Open Document
263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Software Testing and Better Protect Companies
09/19/13 IS4560
Lab 1

Task 1

1. Introduction
2. Will the testing be done after business hours?
3. The scope covers the type of testing one need to do like load testing. The scope defines what will be done in the testing process.
4. Define what will be tested and when.
5. Define what we test first.
6. Define what passed and what failed.
7. Define what day and time testing will begin and end.

Task 2
1. Foot printing, Scanning and Enumeration, System Hacking, Deploy Payload and cover tracks. 2. The first step would be reconnaissance to gather information quietly.

3. Google would be the first and foremost tool.

4. Phishing and baiting would be the most common.

5. Refers to scanning a system for vulnerabilities and reveals information about the target that is needed to access it. 6. By deleting all traces of information that the attacker was there, being careful not to delete too much which could also prove someone was there. 7. Most hackers would leave a backdoor into the system.

8. Stop here and report it.

9. NIST 800-42 Guideline on Network Security testing.

10. Planning, Discovery, attack, and reporting.

11. To show what an attacker would have access to if they were in the system.

12. The tester should only penetrate areas that the client has informed and told them to. 13. This would be to test the response of their IT team and if they can detect in intruder. 14. A web application penetration only focuses on the web application itself and a network test focuses on the network. 15. A hacker uses his talents to affect a personal gain while an ethical hacker uses his talents to help better protect companies.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Penetration testing should be done to test the network for vulnerabilities. There are several types of penetration testing. “An automated port based scan is generally one of the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lkt2 - Task 3

    • 871 Words
    • 4 Pages

    connection to the internet. While this provides fewer points of entry for malicious activity, it…

    • 871 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    1. It can show hackers where to attack and what the most vulnerable parts of the traffic are.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    3. Who will have access to the systems and how will this access be monitored?…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    b. Unwanted access can be turned off, or excluded when logged in via a monitoring service, as well as time restricted login. Any unauthorized logins will be recorded and terminated as well as site information and tracing information. Security measures are implied (camera, onsite security, etc.).…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    5). What does the Enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective?…

    • 592 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Brownfields

    • 547 Words
    • 3 Pages

    5. Let the tests remain in their designated areas for the appropriate amount of time; ensure that the tests are not disturbed by cars, human activity, etc.…

    • 547 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    5. What does the enumeration step of the five (5) step hacking process entail and how is it vital to the hacker’s objective?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    These are basic steps towards securing the central database from attacks such as denial of service that is mainly caused by unauthorised access. The strategy is simple and less costly thus cannot cause strain on the budget.…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IS3110 Lab 5

    • 610 Words
    • 3 Pages

    It is a list of what the potential exploits are and the severity of the vulnerability. It attempts to provide…

    • 610 Words
    • 3 Pages
    Good Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    8. Describe what each of these tests or scripts performs within the Zenmap GUI (Nmap) scan report.…

    • 362 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Water and Bunsen Burner

    • 1547 Words
    • 7 Pages

    Which statement describes two unsafe laboratory practices represented in the diagram? A) The flame is too high and the test tube is unstoppered. B) The opening of the test tube is pointed toward the student and the student is not wearing goggles. C) The test…

    • 1547 Words
    • 7 Pages
    Good Essays