This website uses cookies to ensure you have the best experience. Learn more

Nt2580 Unit 1 Essay

3775 words - 16 pages

NT2580-M1 Introduction to Information Security
Unit 1: Information Systems Security Fundamentals
2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm)
Student Name ___________________________________
Lesson Plan
Theory (in class, Lab #2)……………………………..…………………..……...2

Kim and Solomon, Chapter 1: Information Systems Security.

Student Assignments for this Unit
Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap)

Lab #1: Performing Network Reconnaissance using Common Tools
Overview and access vLab..............................................................................................3

Part 1: Exploring the ...view middle of the document...

All they really need to
know is one vulnerability, or how to use one automated tool that attacks that
vulnerability. Defenders, on the other hand, need to have a comprehensive knowledge of
networks and networking protocols. Defenders also need to understand how to identify
and test for vulnerabilities in computer systems, routers, switches, firewalls, and other
network devices. They need to find and close as many vulnerabilities as possible, as soon
as possible.
Hackers traditionally follow a five-step approach to seek out and compromise targeted
hosts: reconnaissance, scanning, vulnerability analysis (enumeration), exploitation (the
actual attack), and post-attack activities, including remediation of the vulnerabilities. The
first step, reconnaissance, begins with identifying the target and learning as much as
possible about the target. During the reconnaissance phase, hackers scan a network to
identify IP hosts, open ports, and services enabled on servers and workstations.
In this lab, you will explore the common tools available in the virtual lab environment.
You will use Wireshark to capture and analyze network traffic, use OpenVAS to scan the
network, review a sample collection of data using NetWitness Investigator, connect to a
remote Windows machine and explore two file transfer applications, FileZilla and
Tftpd64. You will use PuTTY to connect to a Linux machine and run several Cisco
commands to display statistics for the network interfaces. Finally, you will use Zenmap
to perform a scan of the network and create a network topology chart.
This lab has four parts which should be completed in the order specified.
1. In the first part of the lab, you will explore the tools used within the virtual lab
2. In the second part of the lab, you will use PuTTY to connect to a Linux server and
perform several Cisco IOS operations.
3. In the third part of the lab, you will use Zenmap to perform a basic reconnaissance of
the targeted machine.


Page 3 of 76

Learning Objectives
Upon completing this lab, you will be able to:
Explore common network scanning and analysis tools
Perform network reconnaissance and probing on the machines in the Virtual Security
Cloud Lab (VSCL)
Use Zenmap to perform an Intense scan on an entire subnetwork (
Create a Fisheye Bubble chart to explain the relationships between devices on a
Explain how attackers use common network scanning and analysis tool to compromise
Tools and Software
The following software and/or utilities are required to complete this lab. Students are
encouraged to explore the Internet to learn more about the products and tools used in this


Page 4 of 76

Lab #1: Performing Network Reconnaissance using Common Tools
Accessing distance-education website

1. Connect to
Type in...

Other Papers Like Nt2580 Unit 1

Itt 255 Lab 6 Essay

3922 words - 16 pages the course deliverables – work on small assignment components every day 14 Date: 2/12/2012 Introduction to Information Security Syllabus Course Outline Graded Activities Unit # Unit Title Assigned Readings Grade Allocation (% of all graded work) Grading Category # Activity Title Lab Fundamentals of Information Systems Security:  Chapter 1 Assignment 1.1 Perform Reconnaissance & Probing Using ZenMap GUI (Nmap

Freedom And Responsibility Essay

2141 words - 9 pages very next day, tables were placed in front of the Administration building. On October 1, Jack Weinberg, who was running the CORE (Congress on Racial Equality) table, was arrested by campus police after he refused to state his name and hand over his student card. As they brought a car to the plaza to take the limp Jack Weinberg, the students spontaneously surrounded the cop car and deflated the tires to keep the car from leaving campus. For 32 hours

Hate Crime Laws

2348 words - 10 pages facial bones broke and he fell backward onto the pavement, cracking his skull and dislocating his brain from the brain stem. Kennedy was taken off life support later that day. Moller was initially charged with his death, but the charges were reduced to manslaughter without the hate crime attachment, and he was sentenced to only 5 years. With good behavior and other benefits, Moller served a little over 1 year for the death of Sean Kennedy (Algren

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages -Behavior Therapy, 26(2), 63-88. Ellis, A. (2000). Can rational emotive behavior therapy (REBT) be effectively used with people who have devout beliefs in God and religion. Professional Psychology: Research and Practice, 31 (1), 29-33. Jones, S.L., & Butman, R.E. (1991). Modern psychotherapies: A comprehensive Christian appraisal. Downers Grove, IL: InterVarsity Press. Lega, L.I., & Ellis, A. (2001). Rational emotional behavior therapy (REBT) in

Holidays In Albania

1636 words - 7 pages Have you ever thought about having exciting and incredibly cheap vacations? Albania might be the right choice. According to My Travel Guide, Albania is ranked the fourth among ten places worth visiting in Eastern Europe (“Top 10 Eastern European Destinations”). One can encounter three kinds of vacations in this Mediterranean country: winter, summer, and cultural. The ideal places to spend your winter vacations are the Albanian Alps. They are

A Heart Of Darkness

1748 words - 7 pages In this short story, there are frequent significant subject and ideas that make the story, "A Heart of Darkness," by Joseph Conrad, and haunting novel. The main theme is absolute white power over the natives. The theme validates the corruption, and the dependence caused by the white people as they took over the Congo. White men were giving all the power; they had no self-control, and in the end they did not use wisely. The white men became

The Aspects Of Vulnerability Among The Exploited In Medical Research

2287 words - 10 pages contamination rate. Since the prevalence of the disease was so high, it seemed the results could be found instantaneously. They began the experiment by testing the gamma globulin on the new entrees of Willowbrook while withholding it from others. The leading researcher, Dr. Krugman, decided to open up another unit to Willowbrook, with their own staff, and admitted children for research purposes. The children were fed the live hepatitis virus by way of the

The Hitchhiker’S Guide To The Galaxy

1171 words - 5 pages The Hitchhiker’s Guide to the Galaxy As the human race makes life-changing discoveries, it is made apparent that there is always more to learn as the universe, instead of becoming familiar, is becoming absurd. The Hitchhiker’s Guide to the Galaxy, written by Douglas Adams, as well as the 2005 film adaption, portrays absurdity to be an all-encompassing system in the universe. Through the introduction and attempt to understand lack of reason, the

The Ford Motor Company Wage Increase Of 1914 And The Theory Of Incentives And Efficiency Wages

1252 words - 6 pages be productive, because if caught shirking the loss is high – they will not be able to find another job that pays such a high wage. Additionally, efficiency wages lead to competition among workers (and job seekers), not only those who were already in the job market, but also new incumbents attracted by the higher returns to work. This is illustrated in figure 1 below as an outward shift in the labour supply curve, and is empirically consistent

Historical Analysis Of The Economical Breakthroughs Of The Industrial Revolution

1396 words - 6 pages A Historical Analysis of the Economical Breakthroughs of the Industrial Revolution During the Industrial Revolution, many elements of society experienced huge breakthroughs that would change the way they functioned forever. Economics were definitely one of them. With many new inventions and many factories appearing, many, many, more resources were being created than ever before. Also, all of the revenue from these resources was being given to

Leadership Portrayed in Monologue from Shakespeare’s Henry V

1214 words - 5 pages Bennis, Warren G. 2004 "The Seven Ages of the Leader" Harvard Business Review. Vol. 82. Issue 1. January. 46-53. Badaracco, Joseph L. Jr. 2006"Leadership in Literature. A Conversation with Business Ethicist Joseph L. Badaracco Jr." Harvard Business Review. Vol. 84. Issue 3. January. 47-55. Carter,S and Greer,C. 2013. Strategic Leadership: Values, Styles, and Organizational Performance. Journal of Leadership &Organizational Studies. 20 (4), 375

Related Essays

Nt2580 Unit 1 Assignment 2

554 words - 3 pages Unit 1 Assignment 2 Impact of a Data Classification Standard Internal use only is information that may or may not be confidential. But is shared within a organization and kept away from the public. With that being said it is imperative that we seek the following to be incorporated within the standards in each domain. User Domain refers to the people who have access to the organizations equipment User domains is the worst domain for security

Microsoft Remote Desktop Gateway (Rdg) Essay

263 words - 2 pages 3Mokihana Sabang NT2580 Unit 3 10/11/12 Wallace Dear Richman Investments, I am happy to hear that you are looking to expand your company and are currently looking for a remote access policy. One, I think giving your employees the ability to use their company computers from home and when traveling for the business is a great opportunity, I also believe it can be a high risk with nothing in place of security. I purpose that all computers

Nt2580 Unit 4 Assignment 2

706 words - 3 pages Dallas Page July 17, 2015 Unit 4 Assignment 2 NT2580 Acceptable Use Policy Definition 1. Overview To protect the integrity, confidentiality and accessibility along with the safety of our clientele and employees it is necessary that a precise set of standards must be defined for anyone who utilizes the electronic devices to access information via the internet. Richman Investments is committed to protecting employees, partners and

Itt Nt2580 Unit 5 Essay

1051 words - 5 pages Unit 5 Assignment 1: Testing and Monitoring Security Controls Learning Objectives and Outcomes * You will learn to recognize security events and baseline anomalies that might indicate suspicious activity. * You will learn to identify policy violations and security breaches and to appropriately monitor threats and control activity across the network. Assignment Requirements Refer to the handout Testing and Monitoring Security