Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 4: Security Tools As a consultant with the Waterfall Consulting Co., yo

ID: 3820277 • Letter: Q

Question

Question 4: Security Tools

As a consultant with the Waterfall Consulting Co., you have been assigned to a consulting project at the VIU Company, a small manufacturing company.

VIU is considering enacting a policy that will forbid all but security analysts to posses and use security tools such as scanning tools, password crackers, disassemblers, sniffers, and code analyzers.

Explain whether this policy a good idea?

Explain on how it can be enforced?

Create a report that includes your five recommendations.

Question 5: Wireless Network Survey

As a consultant with the VIU Consulting Co., you have been asked to perform a wireless access point survey at the local Software Company offices. Software Company is concerned that there may be rogue (unauthorized) Wi-Fi access points in use in their company.

Check on Internet and find at least three tools you will use to look for a rogue access points?

List at least two pros and two cons of using these tools?

Please provide me one page answer 900 words answer

Explanation / Answer

ANSWER 4:

Implementing the policy to forbid all except Security Analyst will be a good approach.

Access should be given only to security analyst so that they can use the security tools to scan the open ports in the network which are vulnerable and open to exploit. Password crackers disassemblers, sniffers and code analyzers will help the security analyst to scan the company sites for vulnerabilities. With help of the security tools the security analyst will try to identify the threats on the computer and network within the company. He will attempt to bypass the system security and search for vulnerabilities within the system that can be exploited. Based on these vulnerabilities various changes/controls may be implemented to the system.

Methods to Implement:

Password Cracking: There are many open source password cracking tools available while a hacker may use to attain the username/password of the system. When a new system is installed, in many cases the default password for various applications remains unchanged making it vulnerable to attack. Passwords can also we obtain with the help of cookies stored in the system, in most of the cases unencrypted cookies are stored.

Penetration Testing:

Perform a demo attack on the complete network and system with the intention to find various weaknesses and loopholes which can provide path for attackers to enter the system. We need to patch up these loopholes immediately once detected.

Risk Assessment:

Risk Assessment is an approach to identify the assets within the organization and assess them for the risk attached to them and what will be the consequences once the asset is compromised.

SQL Injection:

Attackers try to obtain vital information about the organization by running queries on the databases. SQL injection needs to be done for apostrophes, brackets, commas, quotation marks, single quote, double quote, etc. Entering such queries should be tested by the security tester. What happens is system will throw a database error whereas such inputs are inserted in queries which will then be executed by the application; here the application is vulnerable to SQL Injection.

Vulnerability Scanning: Here we will potentially inspect the points of exploit within a computer or network to identify the loopholes. Vulnerability should be looked in for on Network, web application, dynamically in a run time environment and to find the open ports.

Enforcing the security policies on others:

1. Restrict the access by business need to know. The ones who are authorized to have access should only have the access others should be restricted from accessing any confidential information.

2. Change all default vendor supplied passwords in the system.

3. Install and maintain a firewall

4. Track and monitor all traffic on the network

5. Regularly scan and test systems and processes

6. Encrypt the transmission of confidential data.

7. Do not store cookies on system; if stored it should be encrypted.

8. Maintain and information security policy for all in the organization and impart regular training for awareness regarding securing the information.

9. Information security is each individual's responsibility.

ANSWER 5:

Tools used to look for a rogue access points:

1. NetStumbler

2. Nessus

3. Wireshark

4. Angry IP Scanner

5. Splunk

6. Capsa Free

Advantages of using above tools:

1. Flexibility: you can use these tools in various environments to detect the unauthorized access to the wireless access points

2. Cost savings: as most of the tools are open source or are within the budget the approach is a cost effective one.

Disadvantages:

1. Performance: Many a times open points goes undetected, you need to use a reliable tool and perform the scans a number of times to achieve the best results.

2. Security: Many a times such tools come with automatic backup or using a cloud network monitoring system. In such cases the vendor should be reliable and trusted ones keeping all your information safe and secure.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote