[ Cyber Attack & Ethical Hacking
01a1] Unit 1 Assignment 1
Week 4
Discovery and Mitigation of Threats (Assignment 1) 5–7 pages
Introduction
Human threats such as theft, terrorism, and malicious insider attacks are considered significant threats to XYZ Corporation, a multi-national company located in Las Vegas, Nevada. The international information technology security team has recently discovered host-to-host threats using footprinting techniques such as port scanning and session hijacking.
The IT security team decided to use host-to-host security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to mitigate the host-to-host threats. However, the cybersecurity blue team recommends the implementation of a symmetric algorithm such as Advanced Encryption Standard (AES) 256 to protect data in XYZ Corporation.
Instructions
The chief information security officer (CISO) has requested that you write a 5–7 page report to describe how the threats were discovered and evaluate approaches for mitigating them.
Your report must:
0. Describe procedures and tools (most likely) used to discover the port scanning threats and the systems impacted.
0. Describe procedures and tools (most likely) used to discover the session hijacking threats and the systems impacted.
0. Evaluate procedures and tools for mitigating these threats, including:
a. Secure Socket Layer.
b. Transport Layer Security.
c. Advanced Encryption Standard (AES) 256.
Your assignment must be supported by a minimum of three recent, peer-reviewed references. Citations and references must be formatted using current APA style.
Structure your report as follows:
. Title page.
. Introduction.
. The Main body (at least five pages); use headings to identify individual sections.
. Summary and conclusion.
. References page. Capella academic integrity standards must be strictly followed.
Submission Requirements
. Written communication: Writing should be clear and well organized, with no technical writing errors, as expected of a business professional
. References: Include a minimum of three recent, peer-reviewed references.
. APA style: Citations and references must be formatted using current APA style.
. Length of the report: A minimum of five typed, double-spaced pages, excluding the title page and references page.
. Font: Times New Roman, 12 points.
[u04d1] Unit 4 Discussion 1
Detection of Host Machines and Wireless Ethical Hacking
(1-page Discussion)
Introduction
Wireless networks can pose a risk to the enterprise because they can be used as a route into the wired network. Each legitimate wireless network is another potential attack vector. Rogue access points pose an even greater risk because they may provide a conduit for an attacker to gain entrance to a network or may be used to trick a victim into thinking they are connecting to a legitimate network. In either case, the ability to identify and locate rogue access point is an important skill for any security practitioner.
Instructions
Numerous complains been received by the chief information security officer (CISO) concerning the availability of rogue wireless devices in your network. These unauthorized connections utilize network resources and expose the organization to vulnerabilities and threats. The CISO asked you to detect hosts in the internal network with the unsupported wireless network interface.
In this discussion:
. Name and describe at least two wireless ethical hacking tools that can be used to accomplish the CISO’s request.
. Describe a strategy can you use to protect the organization from attacks that can be levied through rogue wireless access points.