Security+ Guide to Network

In: Computers and Technology

Submitted By michael7
Words 749
Pages 3
Assessment Worksheet

15

1
Perform Reconnaissance and Probing Using Zenmap GUI (Nmap) Using Zenmap GUI (Nmap)

LAb #1 – ASSESSMENT WORKSHEET

Perform Reconnaissance and Probing Using Zenmap GUI (Nmap)
Course Name and Number:
Fundamentals of Information Systems Security ITSY 1400

student Name:
Michael McClain

Instructor Name:
Dennis Ford

Lab due date:

Overview
Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you will explore the Virtual Security Cloud Lab (VSCL). You will learn how to access several different applications, including PuTTY and the Zenmap Graphical User Interface (GUI) for the Nmap Security Scanner application. You will use the data you uncover to plan an attack on 172.30.0.0/24 where the VM server farm resides.

Lab Assessment Questions & Answers
1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify

whether that application starts as a service on the system or must be run manually.

windows applicaTion loaded
1. File

sTarTs as service Y/n q Yes q Yes q Yes q Yes q Yes

Zilla

x No q

2. Wire

Shark 3. NetWitness Investigator
4. Nessus

x q No

x No q x No q x No q

Server Manager

5. Tftpd32_SE

2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1,

LAN Switch 2, and the IP default gateway router?
Lan Swithch 1 IP 172.16..8.5
Lan Switch 2 IP 172.16.20.5 Default gateway router IP 172.30.0.1

Target window 01 server IP 172.30.0.8

38351_LB01_Pass2.indd 15

26/02/13…...

Similar Documents

Network Security

...Cellular Debate Name Course Date Tutor Network Security Issues on Cellular Network One major advantage of Cellular network security is the ability of communication to be done “Wirelessly” (Xiao et al, 2007). This means that the signals do not follow a specific assigned signal path which may be destroyed by vandals or even by nature, as in case of copper conductors or other physical media such as fiber optic. In addition, data security is enhanced by used of packed switched data in which data is send in form of packets and at no particular order only to be reconstructed at the receiver which makes intercepting such messages cumbersome. In addition, user authentication allows only specific users registered to a specific cellular service provider to use their resources thus allow proper billing to be charged according to the usage of the network(Xiao et al, 2007). A security issue that arises from the use of the cellular networks is subscriber authentication. These systems consist of a large number of subscribers who need to be identified and verified before they can enjoy the services offered by the provider. If authentication is not properly done, then the network is vulnerable to misuse by subscribers not entitled to use the network leading to the service provider incurring losses. Confidentiality is another security issue that can be noted in cellular network (Ciampa, 2009). This is because the ‘air’ channel can be intercepted by malicious people......

Words: 785 - Pages: 4

Network Security

...FLORIDA INSTITUTE OF TECHNOLOGY CYBER SECURITY WITHOUT CYBER WAR U.S. Military vs. International Law Perspective A SHORT PAPER ASSIGNMENT TWO SUBMITTED TO: IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR CYB 5275: ENTERPRISE INFORMATION SECURITY BY CRAIG CANNON MELBOURNE, FLORIDA JANUARY 25TH 2013 In her article “Cyber Security without Cyber War”, Mary Ellen O’Connell does a brilliant job in giving the reader an overall view of the debate concerning which government should have primary responsibility of the internet when it comes to the legal authority of cyberspace. She begins the article by citing two major players in this debate: the U.S. Military with its rules and legislation vs. NATO and its international law. According to O’Connell, the USA feels that the military should have primary responsibility over the internet since it has the largest number of technical experts and legal authorities with respect to cyberspace than anyone else in the world. Many in the international community would disagree with allowing the US military to police the internet. They raise the question: What legal rules would be used to guide the military in its supervision of the internet. They believe that using international law is the best way to govern cyberspace usage. (Johnson, 1996) Still others favor the US military’s Cold War strategy of deterrence as a way of patrolling the internet. These that......

Words: 1872 - Pages: 8

Network Security

...Network security Network Security Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI). Physical layer This layer is responsible for moving raw bits from one node to another: electrical impulse, light or radio signals. This layer represents the physical application security. It includes access control, power, fire, water, and backups. Many of the threats to security at the Physical layer cause a Denial of Service (DoS) of the enterprise application, making the application unavailable to enterprise users. To ensure this does not occur, the electrical and mechanical parts of the network are not only tested periodically but are kept safe from external damages like tampering or other physical destruction. The backups are in a secured room only few people have access to this room. One method used to manage security in this layer is through Physical Layer Automation. By use of tools such as the Apcon's IntellaPatch™ line of copper and fiber Physical Layer switches, the network administrators have control and security at the......

Words: 995 - Pages: 4

Network Security

...Windows XP Migration Project Plan Dan Thomasson dthomasson@carolina.rr.com TS5120 – Project Management March 24, 2004 Table of Contents 1. Executive Summary………………………………………………………………………. | 4 | 2. Definitions, Acronyms, and Abbreviations……………………………………………… | 5 | 3. Project Overview………………………………………………………………………….. | 5 | 3.1. Business Case………………………………………………………………………….. | 5 | 3.2. Windows XP Migration Benefits……………………………………………………… | 6 | 3.2.1. Better Performance……………………………………………………………….. | 6 | 3.2.2. Enhanced Security………………………………………………………………… | 6 | 3.2.3. Better Mobile Experience………………………………………………………… | 6 | 3.2.4. Real-Time Communications……………………………………………………… | 6 | 3.2.5. Return on Investment……………………………………………………………... | 7 | 3.3. Project Charter………………………………………………………………………… | 7 | 3.3.1. Project Objectives………………………………………………………………… | 7 | 3.3.2. Project Budget Information……………………………………………………….. | 7 | 3.3.3. Project Approach………………………………………………………………….. | 7 | 3.4. Project Roles and Responsibilities…………………………………………………….. | 8 | 3.4.1. Roles and Responsibilities………………………………………………………... | 8 | 3.4.2. Responsibility Assignment Matrix………………………………………………... | 9 | 4. Team Contract…………………………………………………………………………….. | 11 | 4.1. Code of Conduct………………………………………………………………………. | 11 | 4.2. Participation…………………………………………………………………………… | 11 | ...

Words: 8774 - Pages: 36

Network Security

...Case Study: Network Security Computer networks of every company have the potential to be exposed to dangers that have the potential to do great harm. Individuals could gain access to Windows and Unix/Linux servers to exploit the company’s vulnerabilities. Computer networks are not only vulnerable to outsiders, but employees also have the opportunity to compromise the system. An unprotected network would open the door for malicious activity that could damage the company’s system, compromise company and customer information, and cost a great amount of precious time and money. A breach in the network could have a negative impact on finances, privacy, and information. Securing the Windows and Unix/Linux servers within a company from shortcomings and vulnerabilities to potential threats by both outsiders and insiders is an absolute necessity. This is achieved by using technical measures and enforcing security policies. One reason it is important to secure the servers is potential of the insider threat. With 1,500 employees, the chance of an attack from the inside is elevated. The threat could come in the form of a disgruntled employee, by someone looking for gain, or by someone who unknowingly compromises the system. Conklin and White (2010) stated the following: One of the hardest threats that security professionals will have to address is that of the insider. Since employees already have access to the organization and its assets, additional mechanisms need to be in place to......

Words: 647 - Pages: 3

Network Security

...[pic] [pic] |School of Science and Technology | |Department of Information Technology | |ISSC361: IT Security: Information Assurance | |3 Credit Hours | |8 Week Course | |Prerequisite(s) :None | |Table of Contents | |Instructor Information |Evaluation Procedures | |Course Description |Grading Scale | |Course Scope |Course Outline | |Course Objectives |Policies | |Course Delivery Method |Academic Services | |Resources |E-Book Links | |Instructor Information ...

Words: 4918 - Pages: 20

Network Security

...Network security is the process of protecting the user from things that can potentially ruin a computer or leak information that other people should not have access to.Some things that can attack a network system include viruses,worms, as well as trojan horses, spyware along with adware,attacks called zero hour,attacks by hackers,denied service hacks,data interception and theft,and the last on being identity theft.In order for network security to work it needs to have both hardware as well as software to protect the network which is done with things such as anti virus and spyware software.It also needs a firewall which is responsible for blocking the unauthorized user from gaining access to the network.Intrusion prevention systems which are tasked with identifying attacks such as zero hour.The last thing to make network security work is a virtual local area network which provides secure remote access. By using these various methods of protecting the network it will benefit the businesses by receiving the customers trust in the company by making sure their privacy is protected in such ways as making sure things like credit card data or sensitive data is stolen and exploited.It also makes sure the network is secure even if it is being used by someone remotely as long as ......

Words: 4285 - Pages: 18

Network Security

...Network Security Clint Tipps September 21, 2014 ISSC340/ APUS Prof. Bryan Jensen Abstract This paper will cover several aspects of network security. Numerous different aspects of wired and wireless network security, including protocols applied to secure a network, penetration testing, digital forensics, and network hardening will be covered. There are numerous methods for providing security to a network, and even more to gain access to one. The challenge is to be one step ahead of anyone who may wish to penetrate the network. For this reason, many owners of large networks perform penetration testing in order to identify potential holes in their network. If malicious activity is detected, using digital forensics can help identify where the attack came from. This would, in turn, lead to a network engineer to harden the network against the identified threat. Network Security Over the last decade, computer systems have increased in speed and capacity while decreasing in price. Computers that where once used in corporate environments are now less powerful than a typical household computer. While this sea change occurred, network communications have grown and improved, to allow computers to communicate easily from remote locations, adding vast opportunities for illegal activities. Data can maliciously be changed or destroyed, systems can be made to malfunction and long distance charges can be avoided. One of the biggest challenges today is to control the security of......

Words: 3488 - Pages: 14

Wireless Networks & Network Security

...Wireless Networks & Network Security ISSC 340 Professor Vijay Venkatesh James Lange 08/13/2013 Wireless Networks are somewhat new technology in comparison to the know-how that makes them possible. The knowledge regarding wireless technology goes back about 200 years. One of the first individuals deserving recognition for today’s wireless networks is a scientist, inventor and politician named Benjamin Franklin. In 1747 he had built a model that showed how electricity could move through the air unaided by any type of wiring. In the early 1750’s Mr. Franklin started experimenting with electricity and the rest is history. Franklin was under the belief that lightening was an electrical current. So with the famous kite and key experiment he proved to himself and others that he was right. His fascination with electricity led him to later experiments with an electrical tube given to him by a friend. A second individual that played a part in today’s wireless technology is Hans Christian Oersted. In 1819 he had found that a compass needle had movement if it was presented with electrical current. This relationship between the needle and the electricity is an essential part of electromagnetism. It is said that this discovery by Oersted happened completely by chance. While preparing for one of his lectures he was setting up some of his equipment. The compass and battery were in close proximity to each other and the needle moved from magnetic north whenever the switch to......

Words: 3213 - Pages: 13

Network Security

...Introduction: Network security is a complicated subject, historically only tackled by well-trained and experienced experts. Initial period of computing, when secured mainframes acted as central hosts and data repositories were accessed only by dumb terminal with limited rights, network security was all but irrefutable. As networks have become geographically more distributed and heterogeneous, however, the risk of their misuse has also increased. As more and more people become “wired”, a large number of people need to understand the basics of security in a networked world. Moreover, Network security is one of the most important part of the computer technology now a days. So now people are more aware about this kind of threat than ever before. They are learning about how to compute the security of a network and fix the common issues in order to have a secure network and trusted internet connection. These are few of the things that you should know very well before you deal with network system because it is save you a big pain later if you don’t know how to use. Some of the things that you can implement are the security principles, mange the security network, how to detect the intrusion in the system, windows and web security and also the most important; police security of network. The best way to prevent intrusion on a network is to read all the policies that show up several times on the system. You are downloading a best item, it doesn’t mean it is security risk free unless......

Words: 272 - Pages: 2

Network Security

...CHAPTER Firewall Fundamentals 2 T o some network administrators, a firewall is the key component of their infrastructure’s security. To others, a firewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of firewalls stems from a basic misunderstanding of the nature of firewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defines the fundamentals of firewalls. These include what a firewall is, what a firewall does, how it performs these tasks, why firewalls are necessary, the various firewall types, and filtering mechanisms. Once you understand these fundamentals of firewalls, you will be able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefits of effective firewall architecture will become clear. Like any tool, firewalls are useful in solving a variety of problems and in supporting essential network security. Chapter 2 Topics This chapter covers the following topics and concepts: • What a firewall is • Why you need a firewall • How firewalls work and what they do • What the basics of TCP/IP are • What the types of firewalls are • What ingress and egress filtering is • What the types of firewall filtering are • What the difference between software and hardware firewalls is • What dual-homed and triple-homed firewalls are • What the best placement of a firewall is 43 Chapter 2 Goals When you......

Words: 15367 - Pages: 62

Network Security

...Nasario Birrueta IT 200: Milestone Three Network Security Network security is one of the most important aspects of implementing a fully functional working network, downtime caused by poor network security can cause major economic loses. The two matters that need to be addressed is the User and Physical equipment. Network security begins with the user. As such would implement a Network Use policy that the employee must sign and adhere to. The company network is to be used for work purposes only. All activity will be monitored and subjected to review by upper management. All users will use strong passwords that are at least 8 characters with upper case and at least one number and not to be shared not even to their immediate supervisors unless OK by IT and or upper management such as a VP or higher. All passwords will be monitored and subject to a monthly review and a password change. Users who do not need internet access will not have access to the internet, a warehouse employee would not need internet access to complete his job duties. But a purchasing employee would need to research for supply vendors that employee would need internet access. In a scenario where a warehouse employee needs internet access a password could be utilized that opens the internet for such these are often called Proxy server or a service that could be used is OpenDNS. At the network level all Personal computers will have the latest and greatest anti-virus software along with all...

Words: 569 - Pages: 3

Network Security

...Client/server Networks Professor: Karen Lederer Trevor Kale 4/16/2011 We shall discuess the difference between Peer-to-Peer networks and the Client/Server networks. First we need to describe how each one operates in order to view the differences between both. First we will describe a Peer-to-Peer network. In the Peer-to-Peer network every computer can communicate directly with every other computer.(2009, Dean, Pg.3) Because of this setup no one computer has more authority then another one on the network. Each person on the network can set their access and restrictions for other users to their computer. These configurations are simple to configure and due to the simplisity they do not require a great technical expertise. They also tend to be cheaper due to lack of need of equipment to establish this network. Some disadvantages consist of not being flexible, that is as they grow they become more difficult to handle. Security on these networks is very lacking due to ease of access of unauthorized access. They are also not very practical due to the lack of centralized resources requires a user to have their terminal on in order to access their resources. That is the basics of a Peer-to-Peer network setup, next we move on to the Client/Server model. In a Client/Server network a centralized computer known as a server facilitates communication between other computers on the network known as clients. For a computer to function as a server they must be running an Network......

Words: 478 - Pages: 2

Network Security

...Network Security Network security is a serious matter. A network allows you to share you to share information and resources, but it also lets computer viruses, human intruders, or even disgruntled employees do far more damage they could on a single machine, imagine what would happened to a company if all is data vanish, then you would understand why network security is so important to a company. Network can be group into Local Area Network (LAN), Wide Area Networks, Internetwork (Internets) all these networks need security to prevent them from nonmalicous humans and malicious attackers, hackers who are after destroying people or causing harm to a company. However before we discuss network security it would be good if we start with having a little knowledge of what a network is. A “network” has been defined as “any set of interlinking lines resembling a net, a network of roads, an interconnected system, a network of alliances”. We can also define network as a collection of communication host. Having said a little about network we then try to know what computer security is all about. Computer security is the process of preventing and detecting unauthorized use of your computer. When we take about preventive measures it help you to stop unauthorized users from accessing any part of your computer system and detection helps you to determine whether or not someone attempted to break into your system. Network security can be defined “as the provision made in an underlying......

Words: 1259 - Pages: 6

Network Security

...Importance of Security The Internet has undoubtedly become the largest public data network, enabling and facilitating both personal and business communications worldwide. The volume of traffic moving over the Internet, as well as corporate networks, is expanding exponentially every day. More and more communication is taking place via e-mail; mobile workers, telecommuters, and branch offices are using the Internet to remotely connect to their corporate networks; and commercial transactions completed over the Internet, via the World Wide Web, now account for large portions of corporate revenue. While the Internet has transformed and greatly improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats from which corporations must protect themselves. Although network attacks are presumably more serious when they are inflicted upon businesses that store sensitive data, such as personal medical or financial records, the consequences of attacks on any entity range from mildly inconvenient to completely debilitating—important data can be lost, privacy can be violated, and several hours, or even days, of network downtime can ensue. Despite the costly risks of potential security breaches, the Internet can be one of the safest means by which to conduct business. For example, giving credit card information to a telemarketer over the phone or a waiter in a restaurant can be more risky than submitting......

Words: 3895 - Pages: 16