Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
repplied to britney 100 words
Discuss the importance of having a signed agreement, and give the implications of conducting a pen test without one. In order for something to be valid it is best to have it in writing with two parties signatures. Someone can say something orally but it is a proven fact when it is written down and signed with a date. It is an agreement. Without consent, the penetration tester is breaking the Computer Misuse Act and could also be liable under various other Acts, depending on data which is discovered during the test.
Many organizations employ intrusion detection systems (IDS) or even intrusion prevention systems (IPS). It is important to understand how these tools protect the organization. These tools protect the organization by helping the system do it’s job. These tools help detect weaknesses in the systems and alert the people when suspicious activity is happening. It is important to do risk assessments. These help protect against threats to the organization.
Recommend an IDS for your organization and include the pros and cons behind your recommendation.
Pros of IDS are as follows:
Detects external hackers and network-based attacks.
Offers centralized management for correlation of distributed attacks.
Provides the system administrator the ability to quantify attacks.
Provides an additional layer of protection.
Provides defense in depth.
Cons of IDS are as follows:
Generates false positives and negatives.
Require full-time monitoring.
It is expensive
Require highly skilled staffs.
Describe how footprinting the stages of an attack might not be detected by an IDS. Footprinting helps attacker to know about the security posture of target organization. It helps attacker reduce their focus area to specific range of IP address, networks, domain ranges etc. It can also benefit attacker by helping them select appropriate exploits by allowing attacker to identify vulnerabilities in the target systems. It can allow attackers to draw a network map or outline the target organization’s network infrastructure to know about the actual environment that they are going to break
REPPLYTO JOSHUA 100 WORDS
Discuss the importance of having a signed agreement and give the implications of conducting a pen test without one.
A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. The Pen tester will find exploits in the system by using known vulnerabilities and report them to the organization. However, it is crucial that the penetration tester get a written signed agreement from the organization before any testing is done. Without a signed agreement, the pen tester will be breaking the law under the Computer Misuse Act and possible other cybercrimes. Also, the pen test needs to know what the requirements and rules of engagement are before testing, this should also be in the written agreement. Remember the big difference between white hat hackers and other hackers is written permission to access the organizations systems.
Many organizations employ intrusion detection systems (IDS) or even intrusion prevention systems (IPS). It is important to understand how these tools protect the organization. Recommend an IDS for your organization and include the pros and cons behind your recommendation.
Many organizations employ IDS and IPS, but what is the difference? An intrusion detection system (IDS) is a network security tool that monitors network traffic for suspicious activity and alerts when such activity is discovered. An intrusion prevention system (IPS) is a network security tool that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur. The main difference between them is that IDS is a monitoring system, which doesn’t alter the network packets in any way. On the other hand, an IPS is a control system, meaning that it prevents the packets from delivering based on the contents of the packets, much like how a firewall prevents traffic by IP address. (Petters, 2020)
I would recommend a Network Intrusion Detection System (NIDS). A NIDS monitors and analyzes traffic coming to and from all network devices. A NIDS operates from a strategic point within the network, typically at data chokepoints.
Pros of a NIDS:
Provides IDS security across the entire network.
A few strategically placed NIDS can monitor an enterprise-size network.
A passive device that does not compromise network availability or throughput.
Relatively easy to secure and hide from intruders.
Covers networks parts where traffic is most vulnerable.
Cons of a NIDS:
Expensive to set up.
If a NIDS must monitor an extensive or busy network, the system can suffer from low specificity and an occasional unnoticed breach.
Detecting threats within encrypted traffic can be problematic.
Typically, not an ideal fit with switch-based networks.
Describe how foot printing the stages of an attack might not be detected by an IDS.
Active foot printing such as, performing a ping or using the traceroute command, can be detected by an IDS. However, passive foot printing may not trigger a target’s IDS or otherwise alert the target of information being gathered due to its stealthier approach. Some of these passive footprinting techniques include: (ITPerfection, 2020)
Browsing the target’s website
Monitoring target using alert services
Visiting social media profiles of employees
Collecting location information on the target through web services
Searching for the website on WHOIS
Finding Information through search engines
Collecting information through social engineering on social networking sites.
Gathering infrastructure details of the target organization through job sites
Gathering financial information about the target through financial services
References
ITPerfection. (2020). What is Footprinting? What is Reconnaissance? Retrieved from: https://www.itperfection.com/ceh/what-is-footprinting-what-is-reconnaissance-hacking-hacker-social-engineering-ids-security-ceh-nslookup-
Petters, J. (March 29, 2020). IDS vs. IPS: What is the Difference? Retrieved from: https://www.varonis.com/blog/ids-vs-ips
VELIMIROVIC, A. (Sept 21, 2021). What Is an Intrusion Detection System? Retrieved from: https://phoenixnap.com/blog/intrusion-detection-system
