Performing Reconnaissance and Probing Using Common Tools Overview One of the key components of an information security program is ensuring that potential attacks and anomalous activities are detected in a timely fashion. This action is accomplished using intrusion detection and prevention systems (IDS or IPS). In order to increase security governance and posture, many organizations may also perform penetration and ethical hacking testing, which can be useful in detecting security vulnerabilities before others. Directions Address each of the following : Compare and contrast the uses of NetWitness Investigator and Wireshark used in the lab. Why would a network administrator use Wireshark and NetWitness Investigator together? Interpret the results of the Wireshark and NetWitness scans performed in the lab. Describe the area of network vulnerability found in each scan. Describe the security risk associated with the vulnerability you discovered. Suggest a security control that you would use to address the vulnerability and explain why it is appropriate. Explain in detail the results returned from the Zenmap reconnaissance. Submission Instructions Submit your assignment in a Word document with well-labeled responses. Length: 3 double-spaced pages Format and Style: Current APA standards. Font: 12 point Times New Roman.
Section 1: Written Project Plan You are now in the final stage of the project plan development. All previous documentation should be combined into one document that will serve as the statement of work for the project. Your goal is to have the project approved by the executive team. The project plan should be very detailed, which is designed to accomplish the monumental task of implementation; however, the executive team is only interested in a 30-minute summation. Therefore, you also must create a compelling executive summary that is supported by your detail that convinces the executive team that they should move forward with your solution. 1. Develop a thirty to forty (30-40) page project plan in which you: a. Write a five to ten (5-10) page executive summary that provides a high-level technical overview of your project in which you: i. Describe the scope of the project and control measures. ii. Describe the goals and objectives of the project. iii. Include a high-level overview of all project deliverables. iv. Give a detailed, realistically estimated cost analysis of the entire project, including human capital. v. Relate the value of the project plan solution to the competitive advantage that information technology will afford your organization. vi. Recommend solution providers who can assist with development and implementation. b. Combine all previous documentation for Project Deliverables 1-5 in which you: i. Provide all aspects of the information technology implementation into the project plan. ii. Revise the documentation based on feedback from the earlier evaluation of your deliverable. c. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Section 1 of this assignment must follow these formatting requirements: Section 1 of this assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS format. Check with your professor for any additional instructions. This course and its assignments require the use of new Strayer Writing Standards (SWS). Please take a moment to review the SWS documentation for details. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in MS Visio or Dia as an appendix of the project plan. All references to these diagrams must be included in the body of the project plan. Section 2: Revised Business Requirements Document 1. Document all revisions made to the written project plan in the Document Control section of the business requirements document from Project Deliverable 2: Business Requirement. Note: This documentation must outline the revisions made to the previous deliverables required in Section 1: Written Project Plan. Section 3: Project Plan PowerPoint Presentation Additional to your detailed executive summary you must present your findings to the executive team and the venture capital group that along with the executive summary will convince the group that your solution is optimal. 2. Create a ten to fifteen (10-15) slide PowerPoint presentation in which you: a. Illustrate the concepts from your executive summary in Section 1 of this assignment. b. Create bulleted speaking notes for your presentation to the executive board in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication. c. Use a professional technically written style to graphically convey the information. Section 4: Finalized Project Plan Use Microsoft project to: 3. Finalize your project plan from Project Deliverable 5: Infrastructure and Security to include all necessary changes in assumptions, tasks, and / or subtasks. The specific course learning outcomes associated with this assignment are: Develop information systems-related activities to maximize the business value within and outside the organization. Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations. Evaluate the issues and challenges associated with information systems integration. Use technology and information resources to research issues in information systems. Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
250-word requirement for each part and At least two APA formatted reference citations (can be quotes) are required and will be used toward your 250-word requirement.Part 1In week 1, we discuss Active Directory. Next week, your manager has asked you, one of her most technical employees, to make a presentation to your co-workers on why your company should implement an Active Directory infrastructure. Explain what the features of Active Directory are and how it can benefit your company. Do some research and find another reputable company that is using active directory. Finally, provide your manager with an idea of how much the Windows 2016 software that will need to be purchased will cost.Part 2Your manager has asked you, one of his most technical employees, to decide which of the 10 new 2016 servers will have a FSMO role, and to explain the function of these 5 roles to him. He has asked that there be a single forest with a parent domain of UMGC.edu and one subdomain of cnas.UMGC.edu. Based on that setup, where would you place the ten domain controllers on the network, and which ones would have FSMO roles? Keep in mind that there are multiple correct answers to this question.Part 3Your new manager is just out of college and she would like the staff to utilize PowerShell more. She has designated that you will cover some of the basic Powershell commands and that you will also explain to the group how users can be added through Powershell. Use your own name when you explain how to create an account using powershell. Add yourself to the managers group, as well as the full time Employees Organizational Unit. Finally, compare and contrast using the Windows command line and Powershell so your fellow staff members can know what they can expect ahead in the coming months.Part 4Your company recently experienced an AD failure right before you came onboard that they were unable to recover from. The new CEO, Chantell Martin, is aware that the disaster caused the preceding CEO to lose his job, and wants you to come up with a viable plan using built in Windows tools to schedule daily backups of the Active Directory database. Some of the questions she needs you to consider as you write the backup policy are:What Windows tools should be utilized?What files and directories should be backed up? What should be the procedure for restoring the backups?Feel free to elaborate on the policy or the technical details.The CEO is counting on you to have a good plan for backing up AD.Part 5 A new CEO has been brought in and she is extremely concerned that another security issue could bring down the company. Her staff has identified you as one of the most technical employees, and she has asked you to make 5 group policy recommendations for locking down the user’s desktops and environment. She is extremely concerned about insider threats (because of the Snowden incident) and wants you to explain to your fellow staff why these policies will prevent users from making the organization’s software vulnerable to security issues.Part 6Your manager has asked you, one of her most technical employees, to make a presentation to your co-workers on ACTIVE DIRECTORY FEDERATION SERVICES (AD FS). Explain what it is, what the advantages are, and how it can benefit your company. Also, to get more buy-in, provide examples of other reputable companies that are also using ACTIVE DIRECTORY FEDERATION SERVICES (AD FS).Materialshttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831484(v=ws.11)?redirectedfrom=MSDN
Before hiring your services, I would like to check some details. The work is for a PhD Thesis, on Interface Design. It goes into usability aspects (UX), but also on mobile design. I do need help: – Complementing the evaluation analysis chapter. There are some paragraphs already there, analysing the responses from the evaluation, but each of them needs more academic support. – Writing other two chapters – they will have a “guide” about where I do want to go, but they need the academic body. These chapters are “recommendations” and “conclusion”. The idea is to have the hired 25000 words spread among these chapters.
Course Project – Design the NetworkThis week’s project activity will consist of one overall site diagram that shows the network with internet connection distributed to the individual offices for each accountant. This should be a logical map that only contains the devices listed below. (No need to include physical walls or desks.) This drawing must include: A single connection from the Internet to a supplied DSL/Cable Modem from the ISP. Modem specs:o Up to 100 Mbps Internet Serviceo Four (4) open, switchable ports for connectivityo Ports are 1 Gbps Ethernet connectionso (It is not important for the scenario whether this is a DSL or Cable Modem.) A Cisco switch to distribute the Internet connection to the offices. Switch specs:o 24 port switcho 1 Gbps Ethernet connectivityo Non-managed Three (3) SOHO wireless routers, one in each office. Router specs:o Each wireless router will have four (4) open switchable portso Multi-band wireless options All wired connections will be made using Cat 6 Ethernet cablesFinally, in the Executive Summary, discuss how your design decisions for this module met the goals of the accountants.For this project, you will use Visio to diagram your network and then you will include your diagram as part of the Module 01 Project Template that you will complete for your project submission.If you need help using Microsoft Visio please review the appropriate resource below:For information about accessing this video tutorial content, please visit LinkedIn.com Access for Rasmussen Students and review the LinkedIn Registration GuideWhen you have access to the video tutorials, use the essential training tutorial that corresponds to your version of the Visio: Visio 2010 Essential Training on LinkedIn.com Visio 2013 Essential Training on LinkedIn.com Visio 2016 Essential Training on LinkedIn.comSubmit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:Jstudent_exampleproblem_101504Need Help? Click here for complete drop box instructions.Template to be usedModule 01 Project TemplateStudent Name:Project overview for Introduction to NetworkingFor this Project you will be designing a wireless network for three accountants sharing an office. Each accountant will have a wireless router for their office space which will be connected through a switch to a single, shared DSL/Cable modem. The accountants want to minimize their network costs, have the same level of connectivity in the three office areas, and want to insure a high level of security for their clients information in each individual office. Module 01 OverviewDevelop one overall site diagram that shows the network with internet connection distributed to the individual offices for each accountant. This should be a logical map that only contains the devices listed in the objectives below. (No need to include physical walls or desks.)ObjectivesThis drawing must include the following: ? A single connection from the Internet to a supplied DSL/Cable Modem from the ISP. Modem specs:o Up to 100 Mbps Internet Serviceo Four (4) open, switchable ports for connectivityo Ports are 1 Gbps Ethernet connectionso (It is not important for the scenario whether this is a DSL or Cable Modem.)? A Cisco switch to distribute the Internet connection to the offices. Switch specs:o 24 port switcho 1 Gbps Ethernet connectivityo Non-managed? Three (3) SOHO wireless routers, one in each office. Router specs:o Each wireless router will have four (4) open switchable portso Multi-band wireless options? All wired connections will be made using Cat 6 Ethernet cablesBody? Insert drawing screenshots hereExecutive SummaryIn this conclusion, discuss how your design decisions for this module met the goals of the accountants for minimizing costs, sharing the internet bandwidth, and securing customer data.1. Minimizing Costs2. Sharing Bandwidth3. Security Concerns
Directions: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be four (4) pages in length; refer to the “Assignment Format” page for specific format requirements. In your course, turn to Lesson 8. Skim through it to refresh your memory. Next, carefully study and review the section titled Approaches to Measuring Technological Progress. Use your own words to write a short compare-and-contrast essay that defines and explains three distinct perspectives on the evolution of technology. As you write, imagine you are talking to a friend who has no knowledge of this topic. In short, write the way you speak, using a conversational tone. Also, try to alternate short sentences and longer sentences to make your writing more readable. Be sure to create a title and cite yourself as the author. For example: A Comparison of Three Perspectives on the Evolution of Technology Mei Quoran Your essay should include five paragraphs, as follows: Paragraph 1 is your lead paragraph. It will contain an overview of what you have to say in comparing and contrasting the perspectives of Gerhard Lenski, Leslie White, and Alvin Toffler with respect to the evolution of technology. Paragraphs 2, 3, and 4, are your body paragraphs. In your essay, use paragraph 2 to describe the perspective of Gerhard Lenski. In paragraph 3, youll write about the perspective of Leslie White. In paragraph 4, youll describe and discuss the perspective of Alvin Toffler. Paragraph 5 is your summary and conclusion. Here, youll compare the three perspectives to show how they are, or may be, similar. Youll contrast the three perspectives to describe how theyre different. Youll end this process–and your essay–by expressing your view as to which of these theorists (one or more) offer the most useful insights into the evolution of technology, in your opinion. Its permissible to use direct quotes from your reading, but dont use too many. One to three such quotes should be your limit. Be sure to put a direct quote in quotation marks. For example: According to Smith, Carbon dioxide is both our friend and our enemy. Begin by writing a first draft. Then, edit and rework your material to make it clear and concise. After you have reached a final draft, proofread the essay one last time to locate and correct grammar and spelling errors.
Topic: The introduction of Bitcoin in January 2009 was the single most important FinTech development in history.Discuss this statement by comparing Bitcoin to previous advances in financial technology, and examples of current trends in FinTech.Notice that there are two equally important issues to address in this essay. The first is placing bitcoin in the context of the broader previous history of financial technology, and the second is inclusion of examples of current trends in FinTech. Some of these current trends will be Bitcoin/blockchain related, while others not. Here you should draw on the activities of current FinTech firms.
In this assignment, you will continue to build on the skills of providing Web page content and structure with HTML and Web page style and layout using CSS. Design and develop an intermediate-level Web page consisting of valid HTML content that includes semantic elements, images, and tables. Follow these steps: Create a folder called Unit3IP. Then create a static Web page that includes the basic structure of a valid HTML (not XHTML) document and a CSS file. Make sure to include the language attribute of the html element and the character set attribute of the metadata element. Name the Web page Unit3.html Link to the Unit3.css file used to style and layout the Web page. Assign Unit 3 IP to the title. Structure the Web page using the HTML semantic elements header section footer Within the structure of the Web page add other HTML elements including at least: one level-one heading for the page in the header navigation in the header that includes a one level-two heading for a table of contents in the header list of at least three placeholders that navigate to the paragraphs in the section implement accessibility guidelines one level-three heading for the section three paragraphs in the section beginning of each paragraph is an anchor or ID additional text to lengthen the document three paragraphs in the section, one after each content paragraph, these will contain a link that navigates back to the table of contents one figure element in the section to display Image that implements accessibility guidelines Copy the image file to the Web site folder. Submit the image file along with the document. figure caption figure element in the section to display figure caption table with table header table body at least three table rows at least three table data table footer that spans three columns Use of any inline elements should follow current standards No style should be applied Validate the HTML in the Web page. Develop an external CSS to provide style, presentation, and layout to the HTML document. Select Website > Add New Item from the menu and select Style Sheet from Add New Item dialog box. Name the style sheet Unit3.css. Link the CSS file to the HTML document. Add style rules to Unit3.css to accomplish the following: In the following order, use the Calibri font, Arial font, or any available sans-serif font for the text. Set the font size for the body to 85% of the browsers default font size. Set the width of the window to display the document to 950. Center the text in the header. Set the font size for the level-one heading in the header to two and one-half times the browsers default font size. Set the font size for the level-two heading in the header and the level-one heading in the section to one and three-quarter times the browsers default font size. Set the text to undecorated and one and one-quarter times the browsers default font size when the user hovers over or focuses on the links in the table of contents. Set the width of figures to 300. Display figures on the right with the paragraph text flowing to the left of the figures. Set the margin for figures to the equivalent of one capital M on all sides. Set the padding for figures to the equivalent of one capital M on all sides. Display a one pixel black border to the left of figures. Bold the text of figure captions. Set the size of the font of figure captions to one and one-quarter times the browsers default font size. Center the text of figure captions. Clear the float of the figures in the paragraphs that return the user to the table of contents. Center the text of the paragraphs that return the user to the table of contents. Display the footer in the center of the page. Display a one pixel black border around the table, all table data and table headers. Center the text in the table footer. Bold the text in the table footer. Validate the CSS style rules. Zip (compress) the site folder into a .zip file to submit.
Enterprise Firewalls – Configuring a pfSense Firewall on the Client Information security personnel need to have an in-depth understanding of network defense concepts and techniques, including firewalls. In this assignment you apply your knowledge of how firewalls protect information assets against attacks traversing internal and external enterprise networks. 1. Describe briefly what you have learned about configuring a pfSence firewall on the client. 2. Create a diagram depicting how a firewall system can be effectively integrated into a typical enterprise network. Note: There can be multiple devices in a well-protected network. Explain the rationale for device placement(s). The network should include: Switches. Router(s). Server(s). Firewall(s). DMZ. Compare and contrast the primary features of pfSense and Windows Defender firewalls. Explain why one firewall may be more appropriate than the other for a large enterprise network.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.