SlideShare a Scribd company logo
1 of 6
Assignment 1: Business Security Posture
Due Week 3 and worth 90 points
Company XYZ, a mid-sized corporation, is in the middle of
satisfying their regulatory compliance needs. The manager of
security at the company has been tasked by the CIO (Chief
Information Officer) to report on the company’s current security
posture. You are called upon as a 3
rd
party penetration tester, based on your industry reputation of
being both careful and thorough to report on company XYZ’s
security posture. The only information available about the
company is the generalized information found on its company
Website which includes a contact page, home page, customer
login portal, copyright and acceptable use page, and disclaimers
page.
As an experienced penetration tester, you already have a
collection of typical tools you use to conduct your tests (
at minimum, all the tools available in CEH labs for this course
.) The end goal here is to report on company XYZ’s current
security posture through performing penetration tests.
Write a four to five (4-5) page paper in which you outline all
steps you would take to provide company XYZ’s request.
Include but do not limit yourself to the following:
Determine the communications and questions that you need to
ask the Manager of Security before beginning your work
assignment.
Determine the type of documents you would bring to your first
meeting with the Manager of Security (i.e. documents to sign, to
review, to consider).
Explain chronologically when things happen.
Predict what results are expected based on tools and techniques
you use. For example, if a goal is to collect recon data, one
might use the Nmap tool to perform a subnet scan. A similar
scan can be conducted in your iLabs environment and the
resulting data used as support in the form of screenshots when
explaining your theories.
Evaluate the importance of the Nondisclosure Agreement (NDA)
and other legal agreements to both parties.
Propose the main pre-penetration test steps that the penetration
tester should perform before beginning the initial phases of the
XYZ penetration test. Provide a rationale to support your
proposal.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Discuss the need for security analysis.
Discuss the techniques and apply the tools to perform
penetration tests.
Discuss and design a Demilitarized Zone (DMZ).
Use technology and information resources to research issues in
penetration testing tools and techniques.
Write clearly and concisely about Network Penetration Testing
topics, using proper writing mechanics and technical style
conventions.
Points: 90
Assignment 1:
Business Security Posture
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Determine the communications and questions that you need to
ask the Manager of Security before beginning your work
assignment.
Weight: 10%
Did not submit or incompletely determined the communications
and questions that you need to ask the Manager of Security
before beginning your work assignment.
Insufficiently determined the communications and questions
that you need to ask the Manager of Security before beginning
your work assignment.
Partially determined the communications and questions that you
need to ask the Manager of Security before beginning your work
assignment.
Satisfactorily determined the communications and questions that
you need to ask the Manager of Security before beginning your
work assignment.
Thoroughly determined the communications and questions that
you need to ask the Manager of Security before beginning your
work assignment.
2. Determine the type of documents you would bring to your
very first meeting with the Manager of Security.
Weight: 10%
Did not submit or incompletely determined the type of
documents you would bring to your very first meeting with the
Manager of Security.
Insufficiently determined the type of documents you would
bring to your very first meeting with the Manager of Security.
Partially determined the type of documents you would bring to
your very first meeting with the Manager of Security.
Satisfactorily determined the type of documents you would
bring to your very first meeting with the Manager of Security.
Thoroughly determined the type of documents you would bring
to your very first meeting with the Manager of Security.
3. Explain chronologically when things happen.
Weight: 10%
Did not submit or incompletely explained chronologically when
things happen.
Insufficiently explained chronologically when things happen.
Partially explained chronologically when things happen.
Satisfactorily explained chronologically when things happen.
Thoroughly explained chronologically when things happen.
4. Predict what results are expected based on tools and
techniques you use.
Weight: 15%
Did not submit or incompletely predicted what results are
expected based on tools and techniques you use.
Insufficiently predicted what results are expected based on tools
and techniques you use.
Partially predicted what results are expected based on tools and
techniques you use.
Satisfactorily predicted what results are expected based on tools
and techniques you use.
Thoroughly predicted what results are expected based on tools
and techniques you use.
5.
Evaluate the importance of the Nondisclosure Agreement (NDA)
and other legal agreements to both parties.
Weight: 20%
Did not submit or incompletely evaluated the importance of the
Nondisclosure Agreement (NDA) and other legal agreements to
both parties.
Insufficiently evaluated the importance of the Nondisclosure
Agreement (NDA) and other legal agreements to both parties.
Partially evaluated the importance of the Nondisclosure
Agreement (NDA) and other legal agreements to both parties.
Satisfactorily evaluated the importance of the Nondisclosure
Agreement (NDA) and other legal agreements to both parties.
Thoroughly evaluated the importance of the Nondisclosure
Agreement (NDA) and other legal agreements to both parties.
6.
Propose the main pre-penetration test steps that the penetration
tester should perform before beginning the initial phases of the
XYZ penetration test. Provide a rationale to support your
proposal.
Weight: 20%
Did not submit or incompletely proposed the main pre-
penetration test steps that the penetration tester should perform
before beginning the initial phases of the XYZ penetration test.
Did not submit or incompletely provided a rationale to support
your proposal.
Insufficiently
proposed the main pre-penetration test steps that the penetration
tester should perform before beginning the initial phases of the
XYZ penetration test. Insufficiently provided a rationale to
support your proposal.
Partially proposed the main pre-penetration test steps that the
penetration tester should perform before beginning the initial
phases of the XYZ penetration test. Partially provided a
rationale to support your proposal.
Satisfactorily proposed the main pre-penetration test steps that
the penetration tester should perform before beginning the
initial phases of the XYZ penetration test. Satisfactorily
provided a rationale to support your proposal.
Thoroughly proposed the main pre-penetration test steps that
the penetration tester should perform before beginning the
initial phases of the XYZ penetration test. Thoroughly provided
a rationale to support your proposal.
7. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
8. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Assignment 1 Business Security PostureDue Week 3 and worth 90 poi.docx

Paper Information Technology Strategic PlanImagine that a compa.docx
Paper Information Technology Strategic PlanImagine that a compa.docxPaper Information Technology Strategic PlanImagine that a compa.docx
Paper Information Technology Strategic PlanImagine that a compa.docxbunyansaturnina
 
Points 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docxPoints 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docxharrisonhoward80223
 
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
 ISE 510 Final Project Milestone Two Guidelines and Rubric .docx ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
ISE 510 Final Project Milestone Two Guidelines and Rubric .docxaryan532920
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxrhetttrevannion
 
OL 600 Something Great/tutorialoutletdotcom
OL 600 Something Great/tutorialoutletdotcomOL 600 Something Great/tutorialoutletdotcom
OL 600 Something Great/tutorialoutletdotcomdavvvid419
 
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxdannies7qbuggie
 
Interview how to_face_it
Interview how to_face_itInterview how to_face_it
Interview how to_face_its j
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxbfingarjcmc
 
The comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxThe comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxmehek4
 
Qa mock up interview for manual testing
Qa mock up interview for manual testingQa mock up interview for manual testing
Qa mock up interview for manual testingKadharBashaJ
 
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxRunning head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxrtodd599
 
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)Salesforce Partners
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxLeilaniPoolsy
 
JUS 455 Final Project Milestone Two Guidelines and Rubric
 JUS 455 Final Project Milestone Two Guidelines and Rubric   JUS 455 Final Project Milestone Two Guidelines and Rubric
JUS 455 Final Project Milestone Two Guidelines and Rubric MoseStaton39
 
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxAssignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxssuser562afc1
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
 

Similar to Assignment 1 Business Security PostureDue Week 3 and worth 90 poi.docx (17)

Paper Information Technology Strategic PlanImagine that a compa.docx
Paper Information Technology Strategic PlanImagine that a compa.docxPaper Information Technology Strategic PlanImagine that a compa.docx
Paper Information Technology Strategic PlanImagine that a compa.docx
 
Points 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docxPoints 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docx
 
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
 ISE 510 Final Project Milestone Two Guidelines and Rubric .docx ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
OL 600 Something Great/tutorialoutletdotcom
OL 600 Something Great/tutorialoutletdotcomOL 600 Something Great/tutorialoutletdotcom
OL 600 Something Great/tutorialoutletdotcom
 
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
 
Interview how to_face_it
Interview how to_face_itInterview how to_face_it
Interview how to_face_it
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
 
The comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docxThe comparison of written and mediaCompare and contrast simila.docx
The comparison of written and mediaCompare and contrast simila.docx
 
Delivering Secure Projects
Delivering Secure ProjectsDelivering Secure Projects
Delivering Secure Projects
 
Qa mock up interview for manual testing
Qa mock up interview for manual testingQa mock up interview for manual testing
Qa mock up interview for manual testing
 
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxRunning head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
 
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docx
 
JUS 455 Final Project Milestone Two Guidelines and Rubric
 JUS 455 Final Project Milestone Two Guidelines and Rubric   JUS 455 Final Project Milestone Two Guidelines and Rubric
JUS 455 Final Project Milestone Two Guidelines and Rubric
 
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxAssignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 

More from murgatroydcrista

Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxmurgatroydcrista
 
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docxAssignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docxmurgatroydcrista
 
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docxAssignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docxmurgatroydcrista
 
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docxAssignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docxmurgatroydcrista
 
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docxAssignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docxmurgatroydcrista
 
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docxAssignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docxmurgatroydcrista
 
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docxAssignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docxmurgatroydcrista
 
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docxAssignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docxmurgatroydcrista
 
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docxAssignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docxmurgatroydcrista
 
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docxAssignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docxmurgatroydcrista
 
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docxAssignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docxmurgatroydcrista
 
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docxAssignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docxmurgatroydcrista
 
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docxAssignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docxmurgatroydcrista
 
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docxAssignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docxmurgatroydcrista
 
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docxAssignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docxmurgatroydcrista
 
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docxAssignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docxmurgatroydcrista
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxmurgatroydcrista
 
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docxAssignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docxmurgatroydcrista
 
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docxAssignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docxmurgatroydcrista
 
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docxAssignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docxmurgatroydcrista
 

More from murgatroydcrista (20)

Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
 
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docxAssignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
 
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docxAssignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
 
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docxAssignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
 
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docxAssignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
 
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docxAssignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
 
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docxAssignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
 
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docxAssignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
 
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docxAssignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
 
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docxAssignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
 
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docxAssignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
 
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docxAssignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
 
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docxAssignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
 
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docxAssignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
 
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docxAssignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
 
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docxAssignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
 
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docxAssignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
 
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docxAssignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
 
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docxAssignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
 

Recently uploaded

Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 

Recently uploaded (20)

Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 

Assignment 1 Business Security PostureDue Week 3 and worth 90 poi.docx

  • 1. Assignment 1: Business Security Posture Due Week 3 and worth 90 points Company XYZ, a mid-sized corporation, is in the middle of satisfying their regulatory compliance needs. The manager of security at the company has been tasked by the CIO (Chief Information Officer) to report on the company’s current security posture. You are called upon as a 3 rd party penetration tester, based on your industry reputation of being both careful and thorough to report on company XYZ’s security posture. The only information available about the company is the generalized information found on its company Website which includes a contact page, home page, customer login portal, copyright and acceptable use page, and disclaimers page. As an experienced penetration tester, you already have a collection of typical tools you use to conduct your tests ( at minimum, all the tools available in CEH labs for this course .) The end goal here is to report on company XYZ’s current security posture through performing penetration tests. Write a four to five (4-5) page paper in which you outline all steps you would take to provide company XYZ’s request. Include but do not limit yourself to the following: Determine the communications and questions that you need to ask the Manager of Security before beginning your work assignment. Determine the type of documents you would bring to your first meeting with the Manager of Security (i.e. documents to sign, to review, to consider). Explain chronologically when things happen. Predict what results are expected based on tools and techniques you use. For example, if a goal is to collect recon data, one might use the Nmap tool to perform a subnet scan. A similar
  • 2. scan can be conducted in your iLabs environment and the resulting data used as support in the form of screenshots when explaining your theories. Evaluate the importance of the Nondisclosure Agreement (NDA) and other legal agreements to both parties. Propose the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration test. Provide a rationale to support your proposal. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Discuss the need for security analysis. Discuss the techniques and apply the tools to perform penetration tests. Discuss and design a Demilitarized Zone (DMZ). Use technology and information resources to research issues in penetration testing tools and techniques. Write clearly and concisely about Network Penetration Testing topics, using proper writing mechanics and technical style conventions. Points: 90
  • 3. Assignment 1: Business Security Posture Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Determine the communications and questions that you need to ask the Manager of Security before beginning your work assignment. Weight: 10% Did not submit or incompletely determined the communications and questions that you need to ask the Manager of Security before beginning your work assignment. Insufficiently determined the communications and questions that you need to ask the Manager of Security before beginning your work assignment. Partially determined the communications and questions that you need to ask the Manager of Security before beginning your work assignment. Satisfactorily determined the communications and questions that you need to ask the Manager of Security before beginning your work assignment. Thoroughly determined the communications and questions that you need to ask the Manager of Security before beginning your
  • 4. work assignment. 2. Determine the type of documents you would bring to your very first meeting with the Manager of Security. Weight: 10% Did not submit or incompletely determined the type of documents you would bring to your very first meeting with the Manager of Security. Insufficiently determined the type of documents you would bring to your very first meeting with the Manager of Security. Partially determined the type of documents you would bring to your very first meeting with the Manager of Security. Satisfactorily determined the type of documents you would bring to your very first meeting with the Manager of Security. Thoroughly determined the type of documents you would bring to your very first meeting with the Manager of Security. 3. Explain chronologically when things happen. Weight: 10% Did not submit or incompletely explained chronologically when things happen. Insufficiently explained chronologically when things happen. Partially explained chronologically when things happen. Satisfactorily explained chronologically when things happen. Thoroughly explained chronologically when things happen. 4. Predict what results are expected based on tools and techniques you use. Weight: 15% Did not submit or incompletely predicted what results are expected based on tools and techniques you use. Insufficiently predicted what results are expected based on tools and techniques you use. Partially predicted what results are expected based on tools and techniques you use. Satisfactorily predicted what results are expected based on tools and techniques you use. Thoroughly predicted what results are expected based on tools and techniques you use.
  • 5. 5. Evaluate the importance of the Nondisclosure Agreement (NDA) and other legal agreements to both parties. Weight: 20% Did not submit or incompletely evaluated the importance of the Nondisclosure Agreement (NDA) and other legal agreements to both parties. Insufficiently evaluated the importance of the Nondisclosure Agreement (NDA) and other legal agreements to both parties. Partially evaluated the importance of the Nondisclosure Agreement (NDA) and other legal agreements to both parties. Satisfactorily evaluated the importance of the Nondisclosure Agreement (NDA) and other legal agreements to both parties. Thoroughly evaluated the importance of the Nondisclosure Agreement (NDA) and other legal agreements to both parties. 6. Propose the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration test. Provide a rationale to support your proposal. Weight: 20% Did not submit or incompletely proposed the main pre- penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration test. Did not submit or incompletely provided a rationale to support your proposal. Insufficiently proposed the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration test. Insufficiently provided a rationale to support your proposal. Partially proposed the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration test. Partially provided a
  • 6. rationale to support your proposal. Satisfactorily proposed the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration test. Satisfactorily provided a rationale to support your proposal. Thoroughly proposed the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration test. Thoroughly provided a rationale to support your proposal. 7. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 8. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present