Ethical Hacking -W7 Research work

[ad_1]

Information Systems homework help

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts (example: Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.)

wk 8

1. Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals

2. Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

wk 9
Cybercriminals use many different types of malware to attack systems. Select one common type of malware listed in this article link and using your own words, explain how to defend yourself against it. https://www.esecurityplanet.com/malware/malware-types.html#maliciousmobileapp

wk 10
Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation been avoided?

Reference Article Link:

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

wk 11
Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.

The post Ethical Hacking -W7 Research work appeared first on mynursinghomeworks.

[ad_2]

Source link