[ Cyber Attack & Ethical Hacking

01a1] Unit 1 Assignment 1

Week 4

Discovery and Mitigation of Threats (Assignment 1) 5–7 pages

Introduction

Human threats such as theft, terrorism, and malicious insider attacks are considered significant threats to XYZ Corporation, a multi-national company located in Las Vegas, Nevada. The international information technology security team has recently discovered host-to-host threats using footprinting techniques such as port scanning and session hijacking.

The IT security team decided to use host-to-host security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to mitigate the host-to-host threats. However, the cybersecurity blue team recommends the implementation of a symmetric algorithm such as Advanced Encryption Standard (AES) 256 to protect data in XYZ Corporation.

Instructions

The chief information security officer (CISO) has requested that you write a 5–7 page report to describe how the threats were discovered and evaluate approaches for mitigating them.

Your report must:

0. Describe procedures and tools (most likely) used to discover the port scanning threats and the systems impacted.

0. Describe procedures and tools (most likely) used to discover the session hijacking threats and the systems impacted.

0. Evaluate procedures and tools for mitigating these threats, including:

a. Secure Socket Layer.

b. Transport Layer Security.

c. Advanced Encryption Standard (AES) 256.

Your assignment must be supported by a minimum of three recent, peer-reviewed references. Citations and references must be formatted using current APA style.

Structure your report as follows:

. Title page.

. Introduction.

. The Main body (at least five pages); use headings to identify individual sections.

. Summary and conclusion.

. References page. Capella academic integrity standards must be strictly followed.

Submission Requirements

. Written communication: Writing should be clear and well organized, with no technical writing errors, as expected of a business professional

. References: Include a minimum of three recent, peer-reviewed references.

. APA style: Citations and references must be formatted using current APA style.

. Length of the report: A minimum of five typed, double-spaced pages, excluding the title page and references page.

. Font: Times New Roman, 12 points.

[u04d1] Unit 4 Discussion 1

Detection of Host Machines and Wireless Ethical Hacking

(1-page Discussion)

Introduction

Wireless networks can pose a risk to the enterprise because they can be used as a route into the wired network. Each legitimate wireless network is another potential attack vector. Rogue access points pose an even greater risk because they may provide a conduit for an attacker to gain entrance to a network or may be used to trick a victim into thinking they are connecting to a legitimate network. In either case, the ability to identify and locate rogue access point is an important skill for any security practitioner.

Instructions

Numerous complains been received by the chief information security officer (CISO) concerning the availability of rogue wireless devices in your network. These unauthorized connections utilize network resources and expose the organization to vulnerabilities and threats. The CISO asked you to detect hosts in the internal network with the unsupported wireless network interface.

In this discussion:

. Name and describe at least two wireless ethical hacking tools that can be used to accomplish the CISO’s request.

. Describe a strategy can you use to protect the organization from attacks that can be levied through rogue wireless access points.

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!