Cultural Considerations DB4
June 13, 2022
Discussion
June 13, 2022
Show all

Case (1 Page each)

 Case 1: Gathering Information on a Networks Active Services

After conducting a zone transfer and running security tools on the Alexander Rocco network, youre asked to write a memo to the IT manager, Bob Jones, explaining which tools you used to determine the services running on his network. Mr. Jones is curious about how you gathered this information. You consult the OSSTMM and read Section C on port scanning and the Internet Technology Security section, particularly the material on identifying services, so that you can address his concerns.

Question

a. Based on this information, write a one-page memo to Mr. Jones explaining the steps you took to find this information. Your memo should mention any information you found in the OSSTMM that relates to this stage of your testing.

——————————————————————————————————————————————————————————————————————————————————————————

 

Case 2: Finding Port-Scanning Tools

Security Consulting Company, which has employed you as a security tester, has asked you to research any new tools that might help you perform your duties. It has been noted that some open-source tools your company is using lack simplicity and clarity or dont meet the companys expectations. Your manager, Gloria Petrelli, has asked you to research new or improved products on the market.

Question

a. Based on this information, write a one-page report for Ms. Petrelli describing some port-scanning tools that might be useful to your company. The report should include available commercial tools, such as Retina or Languard, and their costs.

——————————————————————————————————————————————————————————————————————————————————————————

Case 3

Following two articles from the RSS feed, one that details an information security concern and one that explains a new cybersecurity skill or knowledge. Summarize each article and include a concluding paragraph that explains how you as a cybersecurity professional would use this information. 

https://arstechnica.com/information-technology/2022/05/critical-zoom-vulnerabilities-fixed-last-week-required-no-user-interaction/

https://arstechnica.com/information-technology/2022/05/broadcom-will-pay-61-billion-to-become-the-latest-company-to-acquire-vmware/

Leave a Reply

Your email address will not be published. Required fields are marked *