Preview

IS4560 Unit 3 Assignment 1: Information Gathering Plan

Satisfactory Essays
Open Document
Open Document
501 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4560 Unit 3 Assignment 1: Information Gathering Plan
IS4560
Unit 3 Assignment 1
Information Gathering Plan
The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.
However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially undetectable. Very little information has been publicly discussed about arguably one of the least understood, and most significant stages of penetration testing – the process of Passive Information Gathering. This technical paper and information gathering plan reviews the processes and techniques related to the discovery of leaked information. It also includes details on both the significance of the leaked information, and steps organizations should take to halt or limit their exposure to this threat.
There are a number of techniques and processes available when carrying out a Passive Information Gathering exercise. A lot of important information can be passively harvested and subsequently used in a direct attack or to reinforce other attacks targeted at an organization. Depending upon the source, information such as current service patching levels, internal network

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. WU HIPAA Security Policy requires procedures to ensure that access to a system that contains EPHI and is used to provide patient treatment is made available to any caregiver in the case of an emergency if the denial or strict access to that EPHI could inhibit or negatively affect patient care. During extreme emergency conditions, RO would rely upon BJH electronic access to the IMPAC electronic medical record as well as BJH Health Informations Management (HIM) for access to the physical medical record.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    This lab demonstrates the first 3 steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance & Probing) on a targeted IP subnetwork using ZenMap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus® vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found in order to exploit the vulnerability.…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information gathering is a key element when you are trying to find some hidden data about someone, a company, or even a school. In a university, I could determine what the internet protocol address range by going to a web browser and typing in WHOIS in the search engine. Afterwards I would click the WHOIS link and it will take me to a screen with a text search box where I would put in the domain name of the university and hit search. Then I should see the results and it will give me the university’s IP addresses in a range from beginning to end. If I wanted to retrieve data from the Domain Name System, I would log into one of their networks and go to the command line interface and use the nslookup command tool that will allow me to retrieve information from the DNS server saying what is the current server I am currently on and its IP address. In addition I could get more information just by using the nslookup…

    • 480 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Penetration Test plan

    • 869 Words
    • 4 Pages

    The scope of this Penetration test will include a fully intrusive without compromise attack and penetration test on the e-commerce web-based application server and cisco core backbone network that will be during the hours of 2:00am – 6:00am on Saturday and Sunday only. There will be no compromise on the extraction of information. A compromise can be involved only with Written Client Authorization Only. We will apply a full system backup prior to attack and penetration attack in the event of system malfunction or loss of data. This is subject to change at the Clients’ discretion.…

    • 869 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    ISSC362 Lab 4 Assessment

    • 412 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The best security policies would be program-framework and system-specific policies the reason for implementing a program-framework policy is to make sure that a system fits in the overall structure of the business and see if the implemented security program provide the company with an organization-wide direction. The system-specific policy will provide everyone with the purpose, scope, responsibilities, and compliance needed to achieve a secure system.…

    • 608 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cybercrime

    • 12864 Words
    • 52 Pages

    presentation was prepared by me specifically for this class and has not been submitted, in…

    • 12864 Words
    • 52 Pages
    Good Essays
  • Good Essays

    Recognizing these threats affect national businesses and research institutions because valuable and sensitive information is being stored at an increasing rate online. Accessing this data is easily accomplished through unauthorized breaches of computer systems. With the increase of sensitive information being stored online, foreign nations and third-party actors such can conduct cyber-attacks on those systems without detection.…

    • 887 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    [2] R. Mogull, “Top Five Steps to Prevent Data Loss and Information Leaks. Gartner Research (July 2006),” http://www.gartner.com, 2010.…

    • 1821 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The number of articles found, discussing and reporting the threat to information security were four. A brief summary of each is given as follows:…

    • 2132 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Recent Security Threats

    • 1681 Words
    • 7 Pages

    Over the last 30 years the huge change in security threats has been the computing environment to change into interconnected smaller systems form large mainframes (Conklin, 2009). Attackers/hakers have evolved over the last 30 years as the computer age has also evolved. There are numerous automated tools to allow novice attackers to infiltrate any system. It is highly recommended security administrators run tools against their systems to see what attackers see (Conklin, 2009).…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 749 Words
    • 3 Pages

    Covering tracks—The process of deleting log file entries to make it appear that you were never on the exploited system…

    • 749 Words
    • 3 Pages
    Satisfactory Essays