It255 Unit 9 Assignment 2

In: Computers and Technology

Submitted By carlosespiritu
Words 316
Pages 2
Carlos Espiritu

Phases of a computer attack

Phase 1 - Reconnaissance
Phase 2 - Scanning
Phase 3 - Gaining Access
Phase 4 - Maintaining access
Phase 5 - Covering Tracks

Phase 1: Passive and Active Reconnaissance

Passive reconnaissance: This is the process of scouting out a company or individuals knowledge and processes, such as finding out when employees come in to work and leave work. It can also be the result of researching the company through the internet via search engines.

Active Reconnaissance: This is the process of actually scanning the network to find out IP address and services that the network provides. This process will help the hacker determine what vulnerabilities are on the network as well as other important information such as what operating systems the network is using. This is a more intrusive part of reconnaissance than the passive way and has a much higher risk of being detected.

Phase 2: Scanning

This is the process of using the information discovered in the reconnaissance stage and using programs such as port scanners, network mappers, and sweepers. This can result in getting information such as the user accounts, IP addresses and computer names.

Phase 3: Gaining Access

This is the phase where you are taking the information gathered from the reconnaissance and scanning phase, the information gathered is used to exploit vulnerabilities in the network to gain access. There are several ways to do this such as either a wired or wireless LAN connection, physically using a computer on the network, or over the internet.

Phase 4: Maintaining Access

Once a hacker has gained access to the system they need to make sure they can continue to access it, this can be done by backdoors, rootkits, and trojans.

Phase 5: Covering Tracks

Once the hacker has secured his access he must make sure…...

Similar Documents

It255 Unit 3 Assignment 1

...H. Underwood IT255 4/8/13 UNIT 3: Assignment: 1 Remote Access Control Policy 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman Investment’s network from any host. These standards are designed to minimize the potential exposure of Richman Investment’s to damages which may result from unauthorized use of Richman Investment’s resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to Richman Investment’s internal systems, etc. 2.0 Scope This policy applies to all of Richman Investment’s employees, contractors, vendors and agents with a Richman Investment’s owned or personally-owned computer or workstation used to connect to the Richman network. This policy applies to remote access connections used to do work on behalf of Richman Investment’s, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of Richman Investment’s employees, contractors, vendors and agents with remote access privileges to Richman Investment’s corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman Investment’s. 2. General access to the Internet for recreational use...

Words: 1214 - Pages: 5

Unit 9 Assignment

...Unit 9 Assignment 1. Outlook Anywhere uses the __________ component to connect to your Exchange servers from across the Internet. a. POP3 b. RPC over HTTP c. IMAP4 d. MAPI 2. After installation, __________ is configured to accept and route internal email within the organization. a. the Hub Role b. the Edge Role c. the Mailbox Role d. the CAS role 3. Each Hub role server can be configured with ________________ e-mail address that users can use to send alerts to the administrator in case of e-mail-relay-related problems. a. a Postmaster b. an FQDN c. a DAV d. a MIME 4. Which standard describes e-mail attachment formats? a. DAV b. SPA c. IMAP d. MIME 5. Edge role servers must use ADAM to periodically obtain AD and Exchange information using the _______________ protocol from a server that hosts the Hub role. a. EdgeSync b. ADSync c. HubSync d. EdgeServerSync 6. When viewing all the mail users and mail contacts in an organization, you can create _______ to narrow the list of objects displayed under the Mail Contact node. a. parameters b. filters c. inserts d. attachments 7. What must be in place on your Hub and Edge role servers in order to relay email within your organization and across the Internet? a. Connectors b. Senders c. Relayers d. Internet Forwarders 8. There are _______ major types of recipient objects that can be created in Exchange Server 2007. a. 5 b. 7 c.......

Words: 324 - Pages: 2

Business Law Unit 9 Assignment 2 the Case

...Business Law Unit 9 Assignment 2 the Case Tammy Julian Kaplan University Business Law LS311 Prof. Starcher November 17, 2013 Business Law Assignment 2 the Case The case of the Langley Brothers, Inc., exempt securities are in question, The Langley Brothers decide to sell no par common stock worth $ 1 million dollars to the public. The stock will only be sold in the state of Kansas. Joseph Langley says that the offering does not need to be registered with the Securities and Exchange Commission. His brother, Harry disagrees. According to the Securities Act of 1933 there are a number of specific securities that are exempt to registration but they must meet certain criteria. These criteria are the securities (1) must be government issued, (2) bank and financial institution securities, (3) short-term notes and drafts, (4) securities of nonprofit, education and charitable organizations, (5) securities issued by common carriers, (6) insurance issued by a state-regulated insurance company, (7) securities issued in a corporate reorganization in which one security is traded for another. (8) Securities issued in stock dividends and stock splits (Miller & Jentz. 8th Ed., 2010 p. 568). The stock that is being sold in this case does not meet any of the criteria. The one criteria that this stock does meet is the intrastate offering Rule 147. Rule 147 states that intrastate transactions involving purely local offerings are exempt transactions (miller & Jentz. 8th......

Words: 303 - Pages: 2

Unit 9 Final Assignment

...Unit 9 Final Assignment – Early Childhood: Ages 3-6 Years Kaplan University PS220-04: Child and Adolescent Psychology Professor Jill Maschio Saturday, September 8, 2012 Early Childhood: Ages 3 – 6 Years Introduction: I have decided to complete my research/assignment on Early Childhood: Ages 3 to 6 years of age. I choose this topic because this is the age group that I would like to work with once I obtain my Bachelors of Science in Psychology with a minor in Child Development, and I also find children in this age group to be very interesting especially on the way they view life around them and how independent they become. The Stages of Development: Cognitive Development: Language begins to develop rapidly, also children begin to use language as their communication tool and their vocabulary increases tremendously. Physical Development: Each skill that the child already has is practiced and becomes perfected. Therefore at this stage the child applies and develops mastery motor skills in challenging situations they are faced with. Social Development: At this age and in this stage the child will begin to learn the concept of right from wrong. Also at this stage he or she begins to imitate what he or she sees an individual do, whether a family member or friend at school. Children at this stage and age also begin to interact with their peers. Theories: Erickson’s Psychosocial Theory of Development: “highlights the child’s composite need to initiate......

Words: 634 - Pages: 3

Unit 9 Assignment

...Unit 9 Assignment: | Definitions Unit 9 Definitions: 1) Forward Biased LED - a voltage applied to a circuit or device, especially a semiconductor device, in the direction that produces the larger current 2) Incoherent Light - Electromagnetic radiant energy not all of the same phase, and possibly also consisting of various wavelengths. 3) Laser - device for the creation, amplification, and transmission of a narrow, intense beam of coherent light 4) Output Pattern – Signal output made during an individual test 5) Output Pattern – Voltage output made by an individual object 6) Modulation Speed - the process of varying one or more properties of a periodic waveform, called the carrier signal (high frequency signal), with a modulating signal that typically contains information to be transmitted. 7) Core Diameter Mismatch – The initial core of a wire or cable is unsuitable for the made object 8) Current – The amount of power being produced within or by an object 9) PIN Photodiode – a diode with a wide, lightly doped 'near' intrinsic semiconductor region between a p-type semiconductor and an n-type semiconductor region. 10) Avalanche Photodiode – a highly sensitive semiconductor electronic device that exploits the photoelectric effect to convert light to electricity 11) Responsivity – measures the input–output gain of a detector system. In the specific case of a photodetector, responsivity measures the electrical output per optical input. 12) Optical Subassembly –......

Words: 606 - Pages: 3

Unit 9 Assignment 2

...Ryan Hulett Assignment 9.2 IS 3340 5 – 21 – 14 1. All: RSA Archer Incident Management centralizes and streamlines the case management lifecycle for cyber and physical incidents and ethics violations. This web-based incident-management software lets you capture events that may escalate into governance, risk management, and compliance (GRC) incidents, evaluate incident criticality, and assign responders based on impact and regulations. You can also consolidate response procedures, manage investigations end to end, and report on trends, losses, recovery efforts, and related incidents. Powered by the RSA Archer enterprise governance, risk management, and compliance (eGRC) platform, Incident Management handles incidents anywhere you operate—from detection through analysis and resolution. 2. All: D3 ONE is a fully integrated security management system with modular web-based solutions for incident management, investigations, physical security operations and PSIM. D3 configures these modules to each customer’s exact need, creating a tailor-made single platform delivering industry leading ease-of-use, enterprise-wide visibility and a common operating picture from which risk is visualized and managed, threats are documented and responded to, and people, property and assets are continually protected with maximum efficiency. 3. Archiving incidents, Communicating incident information, Managing an incident’s tasks and activities: AIRT is a web-based application that has......

Words: 347 - Pages: 2

Unit 9 Assignment

...Unit 9 Assignment PS210: History of Psychology Kaplan University August 18, 2014 Psychology today reflects the history and origins of psychology. In order to have a full understanding of psychology, you need to spend some time exploring its history and origins. Structuralism, in psychology is defined as the study of the elements of consciousness. It focuses on recurring patterns of thought and behaviors and it also involves more psychological aspect of human studies rather than social structures. Structuralist use numerous techniques to examine one's own conscious feelings and thoughts. Functionalism is the study of the mind and how the mind functions to the whole body to adapt into a community or a society. It is also a perspective or theory that tries to explain and justify why society is the way it is. According to different psychologist it can explain social structures and social behavior of a society and their functions. In the functionalist perspective, society is thought to function like organisms, with many social institutions working together to maintain and reproduce societies. Functionalists studied the mind not from the standpoint of its composition, its mental elements or its structure but as a conglomerate or accumulation of functions and processes (Schultz, 2012). William James was the major contributor to functionalism. James broadened the field of structuralism to more of an developmental, education, and gender......

Words: 993 - Pages: 4

Unit 9 Assignment

...Assignment: Treatment Plan For your last Assignment, you will evaluate another case study. Click here to watch a presentation of the Case of Sarah. If you would like a transcript of the presentation, click here. Although Sarah may benefit from many different types of interventions, this project should focus on using group therapy to help Sarah. In your paper, you should address the following: 1. Why might you consider Sarah a good candidate for group counseling? What do you see as the potential advantages and disadvantages of such interaction for Sarah? 2. Describe the type of group that would potentially serve Sarah best. What are your ethical concerns for placing Sarah in a group counseling environment? 3. Oftentimes, group members discover an even greater disruption in their lives as they progress through the group experience. What types of challenges might Sarah encounter? How can you, as her counselor, hope to mitigate the impact of such outcomes? What are some of the legal and ethical concerns related to working with a client like Sarah? 4. Why do you feel that Sarah is ready for the honest open communication that is expected in group counseling environments? How might you assist her in becoming more communicative? 5. Group pressure to conform and scapegoating are common components of group counseling experiences, especially among teenagers. How might you prepare Sarah for such events? 6. What are your legal and ethical concerns associated with group......

Words: 694 - Pages: 3

Ac410 Unit 9 Assignment

...AC410 Unit 9 Assignment Click Link Below To Buy: http://hwcampus.com/shop/ac410-unit-9-assignment/ 18–29. The CPA firm of Carson & Boggs LLP is performing an internal control audit in accordance with PCAOB Standard No. 5. The partner in charge of the engagement has asked you to explain the process of determining which controls to test. Describe the process, presenting each of the links in this process and a short summary of how the auditors approach each of them. v Identify significant accounts and disclosures – An account is significant if there is a reasonable possibility that it could contain a misstatement that alone or in conjunction with others has a material effect on the financial statements (Whittington,2012). 18–34. Simulation Bill Jensen, a staff member of Zhan & Co., CPAs, has given you the following list of what he refers to as “internal control deficiencies” for the Zabling Co. audit and has asked you to review each point and make certain that you agree that each is an internal control deficiency. For each of the following items, reply A (Agree) or D (Disagree) indicating whether the item represents an internal control deficiency. 18–35. Match the following definitions (or partial definitions) to the appropriate term. Each term may be used once or not at all. 18–36. Your working papers for an integrated audit being performed under PCAOB Standard No. 5 include the narrative description below of the cash receipts and billing portions of internal......

Words: 290 - Pages: 2

It222 Unit 9 Assignment

...IT222 Unit 9 Assignment Matching A. authoritative restore B. checkpoint file C. Directory Services Restore Mode D. fragmentation E. garbage collection F. LDP G. system volume H. tombstone I. transaction buffer J. Windows PowerShell ____H___ 1. This object is created when an object is deleted within Active Directory. ____I ___ 2. Active Directory changes are written here before they are committed to disk. ____J___ 3.This is a new advanced command-line and scripting interface included in Windows Server 2008. ____G___ 4.This volume houses the boot files for a Windows Server 2008 computer. ____E___ 5. This describes the process of removing tombstoned objects from the NTDS.DIT file. ____A___ 6. You will need to perform this operation if you have inadvertently deleted one or more Active Directory objects. ____F___ 7. This is a graphical user interface that will allow you to query Active Directory as part of the troubleshooting process. ____B___ 8. This is used as a reference file in case the Active Directory database needs to be recovered from a system failure to ensure that no transactions are lost. ____C___ 9. To perform many Active Directory maintenance operations, you will need to restart your domain controller in this startup mode. ____D__10. This can decrease database performance because updates are made to the Active Directory over time. Multiple Choice Correct choice UPPERCASE, UNDERLINED, RED 1. Which of the following backup types can be......

Words: 545 - Pages: 3

Ac410 Unit 9 Assignment

...AC410 Unit 9 Assignment Click Link Below To Buy: http://hwcampus.com/shop/ac410-unit-9-assignment/ 18–29. The CPA firm of Carson & Boggs LLP is performing an internal control audit in accordance with PCAOB Standard No. 5. The partner in charge of the engagement has asked you to explain the process of determining which controls to test. Describe the process, presenting each of the links in this process and a short summary of how the auditors approach each of them. v Identify significant accounts and disclosures – An account is significant if there is a reasonable possibility that it could contain a misstatement that alone or in conjunction with others has a material effect on the financial statements (Whittington,2012). 18–34. Simulation Bill Jensen, a staff member of Zhan & Co., CPAs, has given you the following list of what he refers to as “internal control deficiencies” for the Zabling Co. audit and has asked you to review each point and make certain that you agree that each is an internal control deficiency. For each of the following items, reply A (Agree) or D (Disagree) indicating whether the item represents an internal control deficiency. 18–35. Match the following definitions (or partial definitions) to the appropriate term. Each term may be used once or not at all. 18–36. Your working papers for an integrated audit being performed under PCAOB Standard No. 5 include the narrative description below of the cash receipts and billing portions of internal......

Words: 290 - Pages: 2

Hi215 Unit 9 Assignment

...HI215 Unit 9 Assignment http://homeworklance.com/downloads/hi215-unit-9-assignment/ Unit 9 Assignment Centers for Medicare and Medicaid Pay-for-Performance Presentation Unit outcomes addressed in this Assignment: Describe the different pay for reporting models under the Centers for Medicare and Medicaid Services Course outcome assessed/addressed in this Assignment: HI215-2: Examine the reimbursement processes of different health insurance plans. GE- 8.2: Use principles of sound reasoning. Instructions Recently, CMS has added several prospective payment systems to their pay-for-reporting program. Many programs begin to take effect in 2012–2013. Pick one of the newly designed quality reporting program discussed in the text. 1. Review the CMS website at http://www.cms.gov/QualityInitiativesGenInfo/ as well as http://www.cms.gov tab “InnovationCenter” at http://innovation.cms.gov/initiatives/index.html 2. Prepare an educational PowerPoint presentation regarding the program’s new requirement for your medical director and department heads at Anywhere Hospital. 3. Provide examples of how this new program may impact your facility from a reimbursement perspective. Requirements Provide a 5–6 slide PowerPoint presentation and download to the Unit 9 Dropbox. See grading rubric for more information. Please be sure to download the file “Writing Center Resources” from Doc Sharing to assist you with meeting APA expectations for written Assignments. Submitting......

Words: 435 - Pages: 2

Hi215 Unit 9 Assignment

...HI215 Unit 9 Assignment Click Link Below To Buy: http://hwcampus.com/shop/hi215-unit-9-assignment/ Centers for Medicare and Medicaid Pay-for-Performance Presentation Unit outcomes addressed in this Assignment: Describe the different pay for reporting models under the Centers for Medicare and Medicaid Services Course outcome assessed/addressed in this Assignment: HI215-2: Examine the reimbursement processes of different health insurance plans. GE- 8.2: Use principles of sound reasoning. Instructions Recently, CMS has added several prospective payment systems to their pay-for-reporting program. Many programs begin to take effect in 2012–2013. Pick one of the newly designed quality reporting program discussed in the text. 1. Review the CMS website at http://www.cms.gov/QualityInitiativesGenInfo/ as well as http://www.cms.gov tab “InnovationCenter” at http://innovation.cms.gov/initiatives/index.html 2. Prepare an educational PowerPoint presentation regarding the program’s new requirement for your medical director and department heads at Anywhere Hospital. 3. Provide examples of how this new program may impact your facility from a reimbursement perspective. Requirements Provide a 5–6 slide PowerPoint presentation and download to the Unit 9 Dropbox. See grading rubric for more information. Please be sure to download the file “Writing Center Resources” from Doc Sharing to assist you with meeting APA expectations for written Assignments. Submitting Your...

Words: 437 - Pages: 2

Hi215 Unit 9 Assignment

...HI215 Unit 9 Assignment http://homeworklance.com/downloads/hi215-unit-9-assignment/ Unit 9 Assignment Centers for Medicare and Medicaid Pay-for-Performance Presentation Unit outcomes addressed in this Assignment: Describe the different pay for reporting models under the Centers for Medicare and Medicaid Services Course outcome assessed/addressed in this Assignment: HI215-2: Examine the reimbursement processes of different health insurance plans. GE- 8.2: Use principles of sound reasoning. Instructions Recently, CMS has added several prospective payment systems to their pay-for-reporting program. Many programs begin to take effect in 2012–2013. Pick one of the newly designed quality reporting program discussed in the text. 1. Review the CMS website at http://www.cms.gov/QualityInitiativesGenInfo/ as well as http://www.cms.gov tab “InnovationCenter” at http://innovation.cms.gov/initiatives/index.html 2. Prepare an educational PowerPoint presentation regarding the program’s new requirement for your medical director and department heads at Anywhere Hospital. 3. Provide examples of how this new program may impact your facility from a reimbursement perspective. Requirements Provide a 5–6 slide PowerPoint presentation and download to the Unit 9 Dropbox. See grading rubric for more information. Please be sure to download the file “Writing Center Resources” from Doc Sharing to assist you with meeting APA expectations for written Assignments. Submitting......

Words: 435 - Pages: 2

Ac410 Unit 9 Assignment

...AC410 Unit 9 Assignment Click Link Below To Buy: http://hwcampus.com/shop/ac410-unit-9-assignment/ 18–29. The CPA firm of Carson & Boggs LLP is performing an internal control audit in accordance with PCAOB Standard No. 5. The partner in charge of the engagement has asked you to explain the process of determining which controls to test. Describe the process, presenting each of the links in this process and a short summary of how the auditors approach each of them. v Identify significant accounts and disclosures – An account is significant if there is a reasonable possibility that it could contain a misstatement that alone or in conjunction with others has a material effect on the financial statements (Whittington,2012). 18–34. Simulation Bill Jensen, a staff member of Zhan & Co., CPAs, has given you the following list of what he refers to as “internal control deficiencies” for the Zabling Co. audit and has asked you to review each point and make certain that you agree that each is an internal control deficiency. For each of the following items, reply A (Agree) or D (Disagree) indicating whether the item represents an internal control deficiency. 18–35. Match the following definitions (or partial definitions) to the appropriate term. Each term may be used once or not at all. 18–36. Your working papers for an integrated audit being performed under PCAOB Standard No. 5 include the narrative description below of the cash receipts and billing portions of internal......

Words: 290 - Pages: 2