Week 4 assignment_Mowery_Lacey

Week 4 assignment_Mowery_Lacey - companys domain names. 2....

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Week 4 assignment You have been hired as a consultant to secure all network devices for a large firm. 1. Describe the steps you would take to determine the needs of the organization (the discovery of the network devices) I would use profiling primarily when determining the needs of the organization. Using post scanning, I would be able to identify any devices on the company network. Using dig as an internal employee, I would be able to see what is vulnerable to a search on the
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: companys domain names. 2. Detail the countermeasures (and tools) you would put in place. To countermeasure profiling, I would use an intrusion detection system to detect any outside discovery attempts. To countermeasure and thwart dig attempts I would block and restrict the DNS to secure its infrastructure....
View Full Document

This note was uploaded on 11/29/2011 for the course ISSC 363 taught by Professor Kelmaiche during the Spring '11 term at American Public University.

Ask a homework question - tutors are online