SlideShare a Scribd company logo
Assignment 1: Attack Methodology and Countermeasures
Due Week 4 and worth 80 points
Imagine that a local company has hired you as a penetration
tester to perform necessary testing. The company has asked you
to report back to the Board of Directors on your findings. You
have free reign to use whatever tools that are at your disposal.
Note: You are not performing an actual penetration test or
creating a penetration test report for this assignment.
Write a two to four (2-4) page paper in which you:
Analyze both the scanning methodology that you could use and
the countermeasures that a company or organization could use
in order to thwart such scanning attempts.
Analyze the key tools available for scanning a network.
Recommend one (1) scanning tool for a hacker and one (1)
scanning tool for a security administrator that you believe
provide the greatest protection for a network. Indicate which of
the chosen tools is most beneficial to you as the penetration
tester. Provide a rationale for your response.
Assess the overall importance of the five (5) major phases of an
attack. Select the phase(s) that you believe to be the most
important for a security administrator to protect against.
Provide a rationale for your selection.
Suggest the key countermeasures that a security administrator
could take in order to protect a company’s assets from Trojans,
viruses, and worms, and impede further damage of an attack.
Provide a rationale for your response.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, your
name, the professor’s name, the course title, and the date. The
cover page and the reference page are not included in the
required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Discuss the concepts of ethical hacking, different types of
hacking, and penetration testing techniques.
Describe footprinting and passive information and competitive
intelligence gathering.
Explain the different types of scanning and scanning
methodology.
Describe enumeration and different techniques used for
enumeration.
Examine the functions and impact of malicious programs and
their countermeasures.
Use technology and information resources to research issues in
ethical hacking.
Write clearly and concisely about topics related to Perimeter
Defense Techniques using proper writing mechanics and
technical style conventions.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 80
Assignment 1:
Attack Methodology and Countermeasures
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Analyze both the scanning methodology that you could use
and the countermeasures that a company or organization could
use in order to thwart such scanning attempts.
Weight: 25%
Did not submit or incompletely analyzed both the scanning
methodology that you could use and the countermeasures that a
company or organization could use in order to thwart such
scanning attempts.
Insufficiently analyzed both the scanning methodology that you
could use and the countermeasures that a company or
organization could use in order to thwart such scanning
attempts.
Partially analyzed both the scanning methodology that you
could use and the countermeasures that a company or
organization could use in order to thwart such scanning
attempts.
Satisfactorily analyzed both the scanning methodology that you
could use and the countermeasures that a company or
organization could use in order to thwart such scanning
attempts.
Thoroughly analyzed both the scanning methodology that you
could use and the countermeasures that a company or
organization could use in order to thwart such scanning
attempts.
2. Analyze the key tools available for scanning a network.
Recommend one (1) scanning tool for a hacker and one (1)
scanning tool for a security administrator that you believe
provide the greatest protection for a network. Indicate which of
the chosen tools is most beneficial to you as the penetration
tester. Provide a rationale for your response.
Weight: 20%
Did not submit or incompletely analyzed the key tools available
for scanning a network. Did not submit or incompletely
recommended one (1) scanning tool for a hacker and one (1)
scanning tool for a security administrator that you believe
provide the greatest protection for a network. Did not submit or
incompletely indicated which of the chosen tools is most
beneficial to you as the penetration tester. Did not submit or
incompletely provided a rationale for your response.
Insufficiently analyzed the key tools available for scanning a
network. Insufficiently recommended one (1) scanning tool for
a hacker and one (1) scanning tool for a security administrator
that you believe provide the greatest protection for a network.
Insufficiently indicated which of the chosen tools is most
beneficial to you as the penetration tester. Insufficiently
provided a rationale for your response.
Partially analyzed the key tools available for scanning a
network. Partially recommended one (1) scanning tool for a
hacker and one (1) scanning tool for a security administrator
that you believe provide the greatest protection for a network.
Partially indicated which of the chosen tools is most beneficial
to you as the penetration tester. Partially provided a rationale
for your response.
Satisfactorily analyzed the key tools available for scanning a
network. Satisfactorily recommended one (1) scanning tool for a
hacker and one (1) scanning tool for a security administrator
that you believe provide the greatest protection for a network.
Satisfactorily indicated which of the chosen tools is most
beneficial to you as the penetration tester. Satisfactorily
provided a rationale for your response.
Thoroughly analyzed the key tools available for scanning a
network. Thoroughly recommended one (1) scanning tool for a
hacker and one (1) scanning tool for a security administrator
that you believe provide the greatest protection for a network.
Thoroughly indicated which of the chosen tools is most
beneficial to you as the penetration tester. Thoroughly provided
a rationale for your response.
3. Assess the overall importance of the five (5) major phases of
an attack. Select the phase(s) that you believe to be the most
important for a security administrator to protect against.
Provide a rationale for your selection.
Weight: 20%
Did not submit or incompletely assessed the overall importance
of the five (5) major phases of an attack. Did not submit or
incompletely selected the phase(s) that you believe to be the
most important for a security administrator to protect against.
Did not submit or incompletely provided a rationale for your
selection.
Insufficiently assessed the overall importance of the five (5)
major phases of an attack. Insufficiently selected the phase(s)
that you believe to be the most important for a security
administrator to protect against. Insufficiently provided a
rationale for your selection.
Partially assessed the overall importance of the five (5) major
phases of an attack. Partially selected the phase(s) that you
believe to be the most important for a security administrator to
protect against. Partially provided a rationale for your selection.
Satisfactorily assessed the overall importance of the five (5)
major phases of an attack. Satisfactorily selected the phase(s)
that you believe to be the most important for a security
administrator to protect against. Satisfactorily provided a
rationale for your selection.
Thoroughly assessed the overall importance of the five (5)
major phases of an attack. Thoroughly selected the phase(s) that
you believe to be the most important for a security
administrator to protect against. Thoroughly provided a
rationale for your selection.
4. Suggest the key countermeasures that a security administrator
could take in order to protect a company’s assets from Trojans,
viruses, and worms, and impede further damage of an attack.
Provide a rationale for your response.
Weight: 20%
Did not submit or incompletely suggested the key
countermeasures that a security administrator could take in
order to protect a company’s assets from Trojans, viruses, and
worms, and impede further damage of an attack. Did not submit
or incompletely provided a rationale for your response.
Insufficiently suggested the key countermeasures that a security
administrator could take in order to protect a company’s assets
from Trojans, viruses, and worms, and impede further damage
of an attack. Insufficiently provided a rationale for your
response.
Partially suggested the key countermeasures that a security
administrator could take in order to protect a company’s assets
from Trojans, viruses, and worms, and impede further damage
of an attack. Partially provided a rationale for your response.
Satisfactorily suggested the key countermeasures that a security
administrator could take in order to protect a company’s assets
from Trojans, viruses, and worms, and impede further damage
of an attack. Satisfactorily provided a rationale for your
response.
Thoroughly suggested the key countermeasures that a security
administrator could take in order to protect a company’s assets
from Trojans, viruses, and worms, and impede further damage
of an attack. Thoroughly provided a rationale for your response.
5. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx

Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
IlonaThornburg83
 
Suppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxSuppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docx
simba35
 
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docxCMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
fathwaitewalter
 
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docxCMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
drennanmicah
 
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docxIT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
christiandean12115
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
josephinepaterson7611
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
211 Check
 
Risks, Threats, and VulnerabilitiesScenarioFullsoft, Inc.docx
Risks, Threats, and VulnerabilitiesScenarioFullsoft, Inc.docxRisks, Threats, and VulnerabilitiesScenarioFullsoft, Inc.docx
Risks, Threats, and VulnerabilitiesScenarioFullsoft, Inc.docx
daniely50
 
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
dannies7qbuggie
 
Technical Project Paper Information Systems SecuritySuppose you.docx
Technical Project Paper Information Systems SecuritySuppose you.docxTechnical Project Paper Information Systems SecuritySuppose you.docx
Technical Project Paper Information Systems SecuritySuppose you.docx
SANSKAR20
 
Penetration Testing Guide
Penetration Testing GuidePenetration Testing Guide
Penetration Testing Guide
Badawy Abd El-Aziz
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
mealsdeidre
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
clarebernice
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
Jorge Orchilles
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
shyamuop
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
shyamuopfive
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Network Security
Network SecurityNetwork Security
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docxAssignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
ssuser562afc1
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
Morane Decriem
 

Similar to Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx (20)

Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
 
Suppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docxSuppose that you are currently employed as an Information Security M.docx
Suppose that you are currently employed as an Information Security M.docx
 
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docxCMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
 
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docxCMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx
 
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docxIT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
IT 549 Scenario Assignment Module Eight Guidelines and Rubri.docx
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
 
Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
 
Risks, Threats, and VulnerabilitiesScenarioFullsoft, Inc.docx
Risks, Threats, and VulnerabilitiesScenarioFullsoft, Inc.docxRisks, Threats, and VulnerabilitiesScenarioFullsoft, Inc.docx
Risks, Threats, and VulnerabilitiesScenarioFullsoft, Inc.docx
 
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
 
Technical Project Paper Information Systems SecuritySuppose you.docx
Technical Project Paper Information Systems SecuritySuppose you.docxTechnical Project Paper Information Systems SecuritySuppose you.docx
Technical Project Paper Information Systems SecuritySuppose you.docx
 
Penetration Testing Guide
Penetration Testing GuidePenetration Testing Guide
Penetration Testing Guide
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Network Security
Network SecurityNetwork Security
Network Security
 
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docxAssignment 4 Data MiningDue Week 9 and worth 75 points The .docx
Assignment 4 Data MiningDue Week 9 and worth 75 points The .docx
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 

More from murgatroydcrista

Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
murgatroydcrista
 
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docxAssignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
murgatroydcrista
 
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docxAssignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
murgatroydcrista
 
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docxAssignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
murgatroydcrista
 
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docxAssignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
murgatroydcrista
 
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docxAssignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
murgatroydcrista
 
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docxAssignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
murgatroydcrista
 
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docxAssignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
murgatroydcrista
 
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docxAssignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
murgatroydcrista
 
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docxAssignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
murgatroydcrista
 
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docxAssignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
murgatroydcrista
 
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docxAssignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
murgatroydcrista
 
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docxAssignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
murgatroydcrista
 
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docxAssignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
murgatroydcrista
 
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docxAssignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
murgatroydcrista
 
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docxAssignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
murgatroydcrista
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
murgatroydcrista
 
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docxAssignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
murgatroydcrista
 
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docxAssignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
murgatroydcrista
 
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docxAssignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
murgatroydcrista
 

More from murgatroydcrista (20)

Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
 
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docxAssignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
 
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docxAssignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
 
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docxAssignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
 
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docxAssignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
 
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docxAssignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
 
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docxAssignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
 
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docxAssignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
 
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docxAssignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
 
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docxAssignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
 
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docxAssignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
 
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docxAssignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
 
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docxAssignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
 
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docxAssignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
 
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docxAssignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
 
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docxAssignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
 
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docxAssignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
 
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docxAssignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
 
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docxAssignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
 

Recently uploaded

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 

Recently uploaded (20)

The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 

Assignment 1 Attack Methodology and CountermeasuresDue Week 4 and.docx

  • 1. Assignment 1: Attack Methodology and Countermeasures Due Week 4 and worth 80 points Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings. You have free reign to use whatever tools that are at your disposal. Note: You are not performing an actual penetration test or creating a penetration test report for this assignment. Write a two to four (2-4) page paper in which you: Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts. Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response. Assess the overall importance of the five (5) major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection. Suggest the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, your
  • 2. name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques. Describe footprinting and passive information and competitive intelligence gathering. Explain the different types of scanning and scanning methodology. Describe enumeration and different techniques used for enumeration. Examine the functions and impact of malicious programs and their countermeasures. Use technology and information resources to research issues in ethical hacking. Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 80 Assignment 1: Attack Methodology and Countermeasures Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C
  • 3. Proficient 80-89% B Exemplary 90-100% A 1. Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts. Weight: 25% Did not submit or incompletely analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts. Insufficiently analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts. Partially analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts. Satisfactorily analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts. Thoroughly analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts. 2. Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response. Weight: 20%
  • 4. Did not submit or incompletely analyzed the key tools available for scanning a network. Did not submit or incompletely recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Did not submit or incompletely indicated which of the chosen tools is most beneficial to you as the penetration tester. Did not submit or incompletely provided a rationale for your response. Insufficiently analyzed the key tools available for scanning a network. Insufficiently recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Insufficiently indicated which of the chosen tools is most beneficial to you as the penetration tester. Insufficiently provided a rationale for your response. Partially analyzed the key tools available for scanning a network. Partially recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Partially indicated which of the chosen tools is most beneficial to you as the penetration tester. Partially provided a rationale for your response. Satisfactorily analyzed the key tools available for scanning a network. Satisfactorily recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Satisfactorily indicated which of the chosen tools is most beneficial to you as the penetration tester. Satisfactorily provided a rationale for your response. Thoroughly analyzed the key tools available for scanning a network. Thoroughly recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Thoroughly indicated which of the chosen tools is most beneficial to you as the penetration tester. Thoroughly provided a rationale for your response.
  • 5. 3. Assess the overall importance of the five (5) major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection. Weight: 20% Did not submit or incompletely assessed the overall importance of the five (5) major phases of an attack. Did not submit or incompletely selected the phase(s) that you believe to be the most important for a security administrator to protect against. Did not submit or incompletely provided a rationale for your selection. Insufficiently assessed the overall importance of the five (5) major phases of an attack. Insufficiently selected the phase(s) that you believe to be the most important for a security administrator to protect against. Insufficiently provided a rationale for your selection. Partially assessed the overall importance of the five (5) major phases of an attack. Partially selected the phase(s) that you believe to be the most important for a security administrator to protect against. Partially provided a rationale for your selection. Satisfactorily assessed the overall importance of the five (5) major phases of an attack. Satisfactorily selected the phase(s) that you believe to be the most important for a security administrator to protect against. Satisfactorily provided a rationale for your selection. Thoroughly assessed the overall importance of the five (5) major phases of an attack. Thoroughly selected the phase(s) that you believe to be the most important for a security administrator to protect against. Thoroughly provided a rationale for your selection. 4. Suggest the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response. Weight: 20% Did not submit or incompletely suggested the key
  • 6. countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Did not submit or incompletely provided a rationale for your response. Insufficiently suggested the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Insufficiently provided a rationale for your response. Partially suggested the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Partially provided a rationale for your response. Satisfactorily suggested the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Satisfactorily provided a rationale for your response. Thoroughly suggested the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Thoroughly provided a rationale for your response. 5. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present
  • 7. 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present