SlideShare a Scribd company logo
1 of 8
Week 10 Term Paper
Click the link above to submit your assignment.
Students, please view the "Submit a Clickable Rubric
Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor
Center.
Term Paper: Penetration Testing
Due Week 10 and worth 120 points
As a penetration tester, you are hired as a consultant by a small-
to mid-sized business that is interested in calculating its overall
security risk today, January 1, 2012. The business specializes in
providing private loans to college students. This business uses
both an e-Commerce site and point-of-sales devices (credit card
swipes) to collect payment. Also, there exist a number of file
transfer operations where sensitive and confidential data is
transferred to and from several external partnering companies.
The typical volume of payment transactions totals is
approximately $100 million. You decide that the risk
assessments are to take into account the entire network of
workstations, VoIP phone sets, servers, routers, switches and
other networking gear. During your interview with one of the
business’s IT staff members, you are told that many external
vendors want to sell security networking products and software
solutions. The staff member also claimed that their network was
too “flat.” During the initial onsite visit, you captured the
following pertinent data to use in creation of the Penetration
Test Plan.
·
Non-stateful packet firewall separates the business’s internal
network from its DMZ.
·
All departments--including Finance, Marketing, Development,
and IT--connect into the same enterprise switch and are
therefore on the same LAN. Senior management (CEO, CIO,
President, etc.) and the Help Desk are not on that LAN; they are
connected via a common Ethernet hub and then to the switched
LAN.
·
All of the workstations used by employees are either Windows
98 or Windows XP. None of the workstations have service
packs or updates beyond service pack one.
·
Two (2) Web servers containing customer portals for logging in
and ordering products exist on the DMZ running Windows 2000
Server SP1, and IIS v5.
·
One (1) internal server containing Active Directory (AD)
services to authenticate users, a DB where all data for the
company is stored (i.e. HR, financial, product design, customer,
transactions). The AD server is using LM instead of NTLM.
Write a six to eight (6-8) page paper in which you:
1.
Explain the tests you would run and the reason(s) for running
them (e.g. to support the risk assessment plan).
2.
Determine the expected results from tests and research based on
the specific informational details provided. (i.e., IIS v5,
Windows Server 2000, AD server not using NTLM)
3.
Analyze the software tools you would use for your investigation
and reasons for choosing them.
4.
Describe the legal requirements and ethical issues involved.
5.
Using Visio or its open source alternative, provide a diagram of
how you would redesign this business’ network. Include a
description of your drawing.
Note
: The graphically depicted solution is not included in the
required page length.
6.
Propose your final recommendations and reporting. Explain
what risks exist and ways to either eliminate or reduce the risk.
7.
Use at least four (4) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
·
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
·
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
·
Perform vulnerability analysis as well as external and internal
penetration testing.
·
Demonstrate the ability to describe and perform penetration
tests on communication media to include wireless networks,
VoIPs, VPNs, Bluetooth and handheld devices.
·
Use technology and information resources to research issues in
penetration testing tools and techniques.
·
Write clearly and concisely about Network Penetration Testing
topics using proper writing mechanics and technical style
conventions.
Click
here
to view the grading rubric for this assignment.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 120
Term Paper: Penetration Testing
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain the tests you would run and the reason(s) for running
them (e.g. to support the risk assessment plan).
Weight 10%
Did not submit or incompletely explained the tests you would
run and the reason(s) for running them (e.g. to support the risk
assessment plan).
Insufficiently explained the tests you would run and the
reason(s) for running them (e.g. to support the risk assessment
plan).
Partially explained the tests you would run and the reason(s) for
running them (e.g. to support the risk assessment plan).
Satisfactorily explained the tests you would run and the
reason(s) for running them (e.g. to support the risk assessment
plan).
Thoroughly explained the tests you would run and the reason(s)
for running them (e.g. to support the risk assessment plan).
2. Determine the expected results from tests and research based
on the specific informational details provided.
Weight: 10%
Did not submit or incompletely determined the expected results
from tests and research based on the specific informational
details provided.
Insufficiently determined the expected results from tests and
research based on the specific informational details provided.
Partially determined the expected results from tests and
research based on the specific informational details provided.
Satisfactorily determined the expected results from tests and
research based on the specific informational details provided.
Thoroughly determined the expected results from tests and
research based on the specific informational details provided.
3. Analyze the software tools you would use for your
investigation and reasons for choosing them.
Weight: 15%
Did not submit or incompletely analyzed the software tools you
would use for your investigation and reasons for choosing them.
Insufficiently analyzed the software tools you would use for
your investigation and reasons for choosing them.
Partially analyzed the software tools you would use for your
investigation and reasons for choosing them.
Satisfactorily analyzed the software tools you would use for
your investigation and reasons for choosing them.
Thoroughly analyzed the software tools you would use for your
investigation and reasons for choosing them.
4. Describe the legal requirements and ethical issues involved.
Weight: 15%
Did not submit or incompletely described the legal
requirements; did not submit or incompletely described ethical
issues involved.
Insufficiently described the legal requirements; insufficiently
described ethical issues involved.
Partially described the legal requirements; partially described
ethical issues involved.
Satisfactorily described the legal requirements; satisfactorily
described ethical issues involved.
Thoroughly described the legal requirements; thoroughly
described ethical issues involved.
5. Using Visio or its open source alternative, provide a diagram
of how you would redesign this business’ network. Include a
description of your drawing.
Weight: 20%
Did not submit or incompletely provided a diagram of how you
would redesign this business’ network using Visio or its open
source alternative. Did not submit or incompletely included a
description of your drawing.
Insufficiently provided a diagram of how you would redesign
this business’ network using Visio or its open source
alternative. Insufficiently included a description of your
drawing.
Partially provided a diagram of how you would redesign this
business’ network using Visio or its open source alternative.
Partially included a description of your drawing.
Satisfactorily provided a diagram of how you would redesign
this business’ network using Visio or its open source
alternative. Satisfactorily included a description of your
drawing.
Thoroughly provided a diagram of how you would redesign this
business’ network using Visio or its open source alternative.
Thoroughly included a description of your drawing.
6. Propose your final recommendations and reporting. Explain
what risks exist and ways to either eliminate or reduce the risk.
Weight: 15%
Did not submit or incompletely proposed your final
recommendations and reporting. Did not submit or
incompletely explained what risks exist and ways to either
eliminate or reduce the risk.
Insufficiently proposed your final recommendations and
reporting. Insufficiently explained what risks exist and ways to
either eliminate or reduce the risk.
Partially proposed your final recommendations and reporting.
Partially explained what risks exist and ways to either eliminate
or reduce the risk.
Satisfactorily proposed your final recommendations and
reporting. Satisfactorily explained what risks exist and ways to
either eliminate or reduce the risk.
Thoroughly proposed your final recommendations and
reporting. Thoroughly explained what risks exist and ways to
either eliminate or reduce the risk.
7. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
8. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Week 10 Term PaperClick the link above to submit your assignment..docx

Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
IlonaThornburg83
 
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docxCase Study 2 Public Key InfrastructureSuppose you are the Infor.docx
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx
michelljubborjudd
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
astonrenna
 
QSO 510 Final Project Guidelines and Rubric Overview .docx
QSO 510 Final Project Guidelines and Rubric  Overview .docxQSO 510 Final Project Guidelines and Rubric  Overview .docx
QSO 510 Final Project Guidelines and Rubric Overview .docx
makdul
 
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docxAssignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
howard4little59962
 
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
dannies7qbuggie
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
rosemariebrayshaw
 
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docxProject Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
anitramcroberts
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
bfingarjcmc
 
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docxWeek 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
dannies7qbuggie
 
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docxPoints 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
LeilaniPoolsy
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
alanfhall8953
 
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxRunning head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
rtodd599
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
joshua2345678
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
bagotjesusa
 
7Crisis Response PortfolioYour NameWalden Univer.docx
7Crisis Response PortfolioYour NameWalden Univer.docx7Crisis Response PortfolioYour NameWalden Univer.docx
7Crisis Response PortfolioYour NameWalden Univer.docx
sleeperharwell
 
Hide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docxHide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docx
simonithomas47935
 

Similar to Week 10 Term PaperClick the link above to submit your assignment..docx (20)

Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
 
Internet basic of it20
Internet basic of it20Internet basic of it20
Internet basic of it20
 
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docxCase Study 2 Public Key InfrastructureSuppose you are the Infor.docx
Case Study 2 Public Key InfrastructureSuppose you are the Infor.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
 
QSO 510 Final Project Guidelines and Rubric Overview .docx
QSO 510 Final Project Guidelines and Rubric  Overview .docxQSO 510 Final Project Guidelines and Rubric  Overview .docx
QSO 510 Final Project Guidelines and Rubric Overview .docx
 
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docxAssignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
 
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
 
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docxProject Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
 
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docxWeek 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
 
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
 
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docxPoints 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
 
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxRunning head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
 
Web Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingWeb Application Penetration Tests - Reporting
Web Application Penetration Tests - Reporting
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
 
7Crisis Response PortfolioYour NameWalden Univer.docx
7Crisis Response PortfolioYour NameWalden Univer.docx7Crisis Response PortfolioYour NameWalden Univer.docx
7Crisis Response PortfolioYour NameWalden Univer.docx
 
Hide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docxHide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docx
 

More from dannies7qbuggie

Week3 assignmentSpecial Education Reform EssayView RubricDue D.docx
Week3 assignmentSpecial Education Reform EssayView RubricDue D.docxWeek3 assignmentSpecial Education Reform EssayView RubricDue D.docx
Week3 assignmentSpecial Education Reform EssayView RubricDue D.docx
dannies7qbuggie
 
Weekly discussion response question Carl Solberg provides us with a.docx
Weekly discussion response question Carl Solberg provides us with a.docxWeekly discussion response question Carl Solberg provides us with a.docx
Weekly discussion response question Carl Solberg provides us with a.docx
dannies7qbuggie
 
Weekly Discussion Board ResponseThe weekly discussion board resp.docx
Weekly Discussion Board ResponseThe weekly discussion board resp.docxWeekly Discussion Board ResponseThe weekly discussion board resp.docx
Weekly Discussion Board ResponseThe weekly discussion board resp.docx
dannies7qbuggie
 
Week 9 AssignmentContinue on with building your final application .docx
Week 9 AssignmentContinue on with building your final application .docxWeek 9 AssignmentContinue on with building your final application .docx
Week 9 AssignmentContinue on with building your final application .docx
dannies7qbuggie
 
WEEK EIGHTResearch ProposalDevelop an original researc.docx
WEEK EIGHTResearch ProposalDevelop an original researc.docxWEEK EIGHTResearch ProposalDevelop an original researc.docx
WEEK EIGHTResearch ProposalDevelop an original researc.docx
dannies7qbuggie
 
Week 8 Dropbox 1 - Essay 2 FinalSubmit AssignmentDueFriday.docx
Week 8 Dropbox 1 - Essay 2 FinalSubmit AssignmentDueFriday.docxWeek 8 Dropbox 1 - Essay 2 FinalSubmit AssignmentDueFriday.docx
Week 8 Dropbox 1 - Essay 2 FinalSubmit AssignmentDueFriday.docx
dannies7qbuggie
 
Week 8 Assignment 2 - Submit hereStudents, please view the Subm.docx
Week 8 Assignment 2 - Submit hereStudents, please view the Subm.docxWeek 8 Assignment 2 - Submit hereStudents, please view the Subm.docx
Week 8 Assignment 2 - Submit hereStudents, please view the Subm.docx
dannies7qbuggie
 

More from dannies7qbuggie (20)

Week Three DQ4 - Valid and Reliable DataObjectivesValid.docx
Week Three DQ4 - Valid and Reliable DataObjectivesValid.docxWeek Three DQ4 - Valid and Reliable DataObjectivesValid.docx
Week Three DQ4 - Valid and Reliable DataObjectivesValid.docx
 
Week3 assignmentSpecial Education Reform EssayView RubricDue D.docx
Week3 assignmentSpecial Education Reform EssayView RubricDue D.docxWeek3 assignmentSpecial Education Reform EssayView RubricDue D.docx
Week3 assignmentSpecial Education Reform EssayView RubricDue D.docx
 
Weekly discussion response question Carl Solberg provides us with a.docx
Weekly discussion response question Carl Solberg provides us with a.docxWeekly discussion response question Carl Solberg provides us with a.docx
Weekly discussion response question Carl Solberg provides us with a.docx
 
Week5 ET410 Cost Estimation and BudgetingAn important aspect of .docx
Week5 ET410 Cost Estimation and BudgetingAn important aspect of .docxWeek5 ET410 Cost Estimation and BudgetingAn important aspect of .docx
Week5 ET410 Cost Estimation and BudgetingAn important aspect of .docx
 
Weekly Discussion Board ResponseThe weekly discussion board resp.docx
Weekly Discussion Board ResponseThe weekly discussion board resp.docxWeekly Discussion Board ResponseThe weekly discussion board resp.docx
Weekly Discussion Board ResponseThe weekly discussion board resp.docx
 
Week Three OverviewResourcesDiscussionsAssignmentTo co.docx
Week Three OverviewResourcesDiscussionsAssignmentTo co.docxWeek Three OverviewResourcesDiscussionsAssignmentTo co.docx
Week Three OverviewResourcesDiscussionsAssignmentTo co.docx
 
WEEK 9SIKHISMCosmogony - Origin of the UniverseNature .docx
WEEK 9SIKHISMCosmogony - Origin of the UniverseNature .docxWEEK 9SIKHISMCosmogony - Origin of the UniverseNature .docx
WEEK 9SIKHISMCosmogony - Origin of the UniverseNature .docx
 
Week 9 AssignmentContinue on with building your final application .docx
Week 9 AssignmentContinue on with building your final application .docxWeek 9 AssignmentContinue on with building your final application .docx
Week 9 AssignmentContinue on with building your final application .docx
 
Week One JournalThe article Does the Perceived Risk of Punish.docx
Week One JournalThe article Does the Perceived Risk of Punish.docxWeek One JournalThe article Does the Perceived Risk of Punish.docx
Week One JournalThe article Does the Perceived Risk of Punish.docx
 
WEEK8ISLAMCosmogony - Origin of the UniverseNature o.docx
WEEK8ISLAMCosmogony - Origin of the UniverseNature o.docxWEEK8ISLAMCosmogony - Origin of the UniverseNature o.docx
WEEK8ISLAMCosmogony - Origin of the UniverseNature o.docx
 
Week Eight Homework Exercise Answer the following questions cove.docx
Week Eight Homework Exercise Answer the following questions cove.docxWeek Eight Homework Exercise Answer the following questions cove.docx
Week Eight Homework Exercise Answer the following questions cove.docx
 
Week 8—The Economic Concept of Moral Hazard”--4 short but fasci.docx
Week 8—The Economic Concept of Moral Hazard”--4 short but fasci.docxWeek 8—The Economic Concept of Moral Hazard”--4 short but fasci.docx
Week 8—The Economic Concept of Moral Hazard”--4 short but fasci.docx
 
Week 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docxWeek 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docx
 
Week 8 Discussion 1The Recommendation ReportPlease respo.docx
Week 8 Discussion 1The Recommendation ReportPlease respo.docxWeek 8 Discussion 1The Recommendation ReportPlease respo.docx
Week 8 Discussion 1The Recommendation ReportPlease respo.docx
 
WEEK EIGHTResearch ProposalDevelop an original researc.docx
WEEK EIGHTResearch ProposalDevelop an original researc.docxWEEK EIGHTResearch ProposalDevelop an original researc.docx
WEEK EIGHTResearch ProposalDevelop an original researc.docx
 
Week Discussion Use the Internet or Strayer Library to researc.docx
Week Discussion Use the Internet or Strayer Library to researc.docxWeek Discussion Use the Internet or Strayer Library to researc.docx
Week Discussion Use the Internet or Strayer Library to researc.docx
 
Week 8 Forum What Is American LiteraturePart IChoose a ma.docx
Week 8 Forum What Is American LiteraturePart IChoose a ma.docxWeek 8 Forum What Is American LiteraturePart IChoose a ma.docx
Week 8 Forum What Is American LiteraturePart IChoose a ma.docx
 
Week 8 Dropbox 1 - Essay 2 FinalSubmit AssignmentDueFriday.docx
Week 8 Dropbox 1 - Essay 2 FinalSubmit AssignmentDueFriday.docxWeek 8 Dropbox 1 - Essay 2 FinalSubmit AssignmentDueFriday.docx
Week 8 Dropbox 1 - Essay 2 FinalSubmit AssignmentDueFriday.docx
 
Week 8 Assignment 2 - Submit hereStudents, please view the Subm.docx
Week 8 Assignment 2 - Submit hereStudents, please view the Subm.docxWeek 8 Assignment 2 - Submit hereStudents, please view the Subm.docx
Week 8 Assignment 2 - Submit hereStudents, please view the Subm.docx
 
WEEK 7CHRISTIANITYCosmogony - Origin of the UniverseNatu.docx
WEEK 7CHRISTIANITYCosmogony - Origin of the UniverseNatu.docxWEEK 7CHRISTIANITYCosmogony - Origin of the UniverseNatu.docx
WEEK 7CHRISTIANITYCosmogony - Origin of the UniverseNatu.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 

Week 10 Term PaperClick the link above to submit your assignment..docx

  • 1. Week 10 Term Paper Click the link above to submit your assignment. Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center. Instructors, training on how to grade is within the Instructor Center. Term Paper: Penetration Testing Due Week 10 and worth 120 points As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business’s IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too “flat.” During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan. · Non-stateful packet firewall separates the business’s internal network from its DMZ. · All departments--including Finance, Marketing, Development,
  • 2. and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN. · All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one. · Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5. · One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM. Write a six to eight (6-8) page paper in which you: 1. Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). 2. Determine the expected results from tests and research based on the specific informational details provided. (i.e., IIS v5, Windows Server 2000, AD server not using NTLM) 3. Analyze the software tools you would use for your investigation and reasons for choosing them.
  • 3. 4. Describe the legal requirements and ethical issues involved. 5. Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ network. Include a description of your drawing. Note : The graphically depicted solution is not included in the required page length. 6. Propose your final recommendations and reporting. Explain what risks exist and ways to either eliminate or reduce the risk. 7. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • 4. The specific course learning outcomes associated with this assignment are: · Perform vulnerability analysis as well as external and internal penetration testing. · Demonstrate the ability to describe and perform penetration tests on communication media to include wireless networks, VoIPs, VPNs, Bluetooth and handheld devices. · Use technology and information resources to research issues in penetration testing tools and techniques. · Write clearly and concisely about Network Penetration Testing topics using proper writing mechanics and technical style conventions. Click here to view the grading rubric for this assignment. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 120 Term Paper: Penetration Testing Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D
  • 5. Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Weight 10% Did not submit or incompletely explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Insufficiently explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Partially explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Satisfactorily explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Thoroughly explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). 2. Determine the expected results from tests and research based on the specific informational details provided. Weight: 10% Did not submit or incompletely determined the expected results from tests and research based on the specific informational details provided. Insufficiently determined the expected results from tests and research based on the specific informational details provided. Partially determined the expected results from tests and research based on the specific informational details provided. Satisfactorily determined the expected results from tests and research based on the specific informational details provided.
  • 6. Thoroughly determined the expected results from tests and research based on the specific informational details provided. 3. Analyze the software tools you would use for your investigation and reasons for choosing them. Weight: 15% Did not submit or incompletely analyzed the software tools you would use for your investigation and reasons for choosing them. Insufficiently analyzed the software tools you would use for your investigation and reasons for choosing them. Partially analyzed the software tools you would use for your investigation and reasons for choosing them. Satisfactorily analyzed the software tools you would use for your investigation and reasons for choosing them. Thoroughly analyzed the software tools you would use for your investigation and reasons for choosing them. 4. Describe the legal requirements and ethical issues involved. Weight: 15% Did not submit or incompletely described the legal requirements; did not submit or incompletely described ethical issues involved. Insufficiently described the legal requirements; insufficiently described ethical issues involved. Partially described the legal requirements; partially described ethical issues involved. Satisfactorily described the legal requirements; satisfactorily described ethical issues involved. Thoroughly described the legal requirements; thoroughly described ethical issues involved. 5. Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ network. Include a description of your drawing. Weight: 20% Did not submit or incompletely provided a diagram of how you would redesign this business’ network using Visio or its open source alternative. Did not submit or incompletely included a description of your drawing.
  • 7. Insufficiently provided a diagram of how you would redesign this business’ network using Visio or its open source alternative. Insufficiently included a description of your drawing. Partially provided a diagram of how you would redesign this business’ network using Visio or its open source alternative. Partially included a description of your drawing. Satisfactorily provided a diagram of how you would redesign this business’ network using Visio or its open source alternative. Satisfactorily included a description of your drawing. Thoroughly provided a diagram of how you would redesign this business’ network using Visio or its open source alternative. Thoroughly included a description of your drawing. 6. Propose your final recommendations and reporting. Explain what risks exist and ways to either eliminate or reduce the risk. Weight: 15% Did not submit or incompletely proposed your final recommendations and reporting. Did not submit or incompletely explained what risks exist and ways to either eliminate or reduce the risk. Insufficiently proposed your final recommendations and reporting. Insufficiently explained what risks exist and ways to either eliminate or reduce the risk. Partially proposed your final recommendations and reporting. Partially explained what risks exist and ways to either eliminate or reduce the risk. Satisfactorily proposed your final recommendations and reporting. Satisfactorily explained what risks exist and ways to either eliminate or reduce the risk. Thoroughly proposed your final recommendations and reporting. Thoroughly explained what risks exist and ways to either eliminate or reduce the risk. 7. 3 references Weight: 5% No references provided
  • 8. Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 8. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present