We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

assignment template

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

The users password needs to changed every 90 days. Any employee that has remote access should have a token key on a USB drive that provides the user’s credentials. When an employee retires, quits, or gets fired, they accounts should be locked until IT administrators can go through the account. If the employee had a USB token for remote access, it should be taken back by the IT personnel to prevent unauthorized remote access. Penetration testing should be done to test the network for vulnerabilities.

There are several types of penetration testing. An automated port based scan is generally one f the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, IGMP, etc.

Don't use plagiarized sources. Get Your Custom Essay on
assignment template
Just from $13,9/Page
Get custom paper

), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SAN to be in use).

Typically, a port can have one of wow possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine more about the service that is running on that port. This is more precise than a port scan, because it does not rely on the port alone to determine what service is running. For example, a port scan may be able to identify that TCP port 8000 is open on a host, but it will not know based on that information alone hat service is running there.

A service scanner would attempt to communicate with the port using different protocols. If the service running on port 8000 is able to correctly communicate using HTTP, then it will be identified as a web server. Lastly, banner grabbing is the process of connecting to a specific port and examining data returned from the remote host to identify the service/ application bound to that port. Often in the connection process, software will provide an identification string which may include information such as the name f the application, or information about which specific version of the software is running. (“Vulnerability Analysis,” 2014) After the penetration testing, the system can be updated to mitigate any vulnerabilities that were found.

Cite this assignment template

assignment template. (2018, Jun 26). Retrieved from https://graduateway.com/essay-assignment-template/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page