Free

CYB Week 2 Discussion - Assignment Example

Comments (0) Cite this document
Summary
In computer security, reconnaissance is usually an initial step toward a further attack pursuing to exploit a computer system. The attacker…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
CYB Week 2 Discussion
Read TextPreview

Extract of sample "CYB Week 2 Discussion"

CYB Week 2 Discussion due: The word reconnaissance is originated from military, where it is used to denote to a mission into the enemy area to gain information. In computer security, reconnaissance is usually an initial step toward a further attack pursuing to exploit a computer system. The attacker regularly uses port scanning to discover any vulnerable ports.
Importance of Reconnaissance
1. Network reconnaissance is an important process as it helps to identify security threats to the system and services provided.
2. Facilitates solution to Cyber-security which is an area in which much course development is taking place and of much interest, Cyber-security training is important and necessities to be extended.
3. Help network administrators comprehend emerging and current cyber security threats, antivirus statistics, malware-related domain name system, and malware binary data.
Ways that reconnaissance phase of a pen testing can be automated
1. Concepts of web application Penetration Testing
Web applications find flaws in enterprises Web apps before the attackers do. You will insert SQL into back-end databases, learning how attackers exfiltration delicate data. You will use cross-site scripting attacks to control a targeted infrastructure in a unique hands-on laboratory situation (Kizza, 2005).
2. Ping sweeps
A ping sweep is a diagnostic method used to determine what range of Internet Protocol addresses that are in use by live hosts, usually computers. It is usually used to indicate where active computers are on a network and is sometimes used by the system administrator for identifying a network issue. Ping sweeps are also utilized by computer attackers to see which machines are active so they know where to focus their attacks (Kizza, 2005).
3. Packet Sniffers
A packet sniffer is a program that sees all of the data passing over the network of which the computer is connected to. As data creeks back and forth on the network, the program "sniffs," each packet. A packet is a section of the message that has been broken up. Example
[admin@MikroTik] tool sniffer> start, [admin@MikroTik] tool sniffer> stop. The initial command is used to start/reset sniffering, while stop stops sniffering
4. Port Scanning
Port scanning is defined as the technique of systematically skimming a computers ports, a port is where information gets into and out of a computer, and port scanning identifies open ports to a computer. For instance, TCP Null, TCP Xmas, TCP FIN, TCP SYN, and UDP port scans.
Reference
Kizza, J. M. (2005). Computer Network Security. New York, NY: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CYB Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
CYB Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1646003-cyb-week-2-discussion
(CYB Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 Words)
CYB Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1646003-cyb-week-2-discussion.
“CYB Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1646003-cyb-week-2-discussion.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CYB Week 2 Discussion

Week 9 Discussion 2

...of the company which balance sheet the balance sheet fails to show. It reveals the cash needed to maintain plant efficiency and level of operations. It provides information regarding the liquidity of the firm stock issuance, dividend payment, plant asset disposal, machinery purchase, and net change in inventory, accounts receivable and payable. The balance sheet conceals most of this information (Comiskey & Mulford, 2005). 2. Create an argument indicating that the statement of cash flows contains the most valuable information related to a company’s performance for users of financial statement information. Cash flow statements reports cash movements in operating, investing and financing activities thus helping investors...
1 Pages(250 words)Assignment

Week 2 /Discussion Question 2

...Week 2 /Discussion Question 2 During the civil rights movement of the 1960’s, the methods used by the pacifists clashed with the more radical elements. The resources that the U.S. dedicated to resisting communism and fascism did not bring adequate human well being. The efforts did not realize that the violence problem was fundamental. By deciding to use violence to oppose these ideologies, the U.S. itself agreed to self destruction. Both the pacifists’ methods and those of the more radical elements immensely contributed to change that was realized by the civil rights movement of the 1960’s. The movement did not put more emphasis on violence as a social problem but...
1 Pages(250 words)Personal Statement

Week 5 discussion 2

...Week 5: Discussion In my opinion, embracing diversity in the education system results in positive outcomes for both educators and their students. Diversity in a state arises from the various cities that differ geographically from each other. For example, a state like Texas has various cities such as Dallas and Austin; whereby, socialization of residents into different cultural expectations occurs influencing their attitudes, perceptions and behaviors. In light of this, it is crucial for state policy makers to ensure that education policies implemented account for the needs of the diverse population from different cities (Diarra, 2005). Policies standardizing assessment procedures, teaching strategies and...
1 Pages(250 words)Essay

Week 1 discussion 2

...Week discussion Although rare, children learning a language for the first time might also struggle with pronunciation of certain sounds indicating that pronunciation difficulties are not limited to children learning a second language. Research findings identify strategies that are useful in rectification of pronunciation difficulties (Gagen, 2007). These include; Good modeling: children learn different aspects of language through mimicking those around them. Therefore, it is crucial for instructors and parents to pronounce the words that children are struggling with slowly putting emphasis on the important phonetic sounds. For example, pronunciation of words with /s/ or /z/ requires one to keep the...
1 Pages(250 words)Essay

Week 2 discussion 2

...NASDAQ STOCK MARKET   NADAQ stock market NASDAQ COMPOSITE INDEX YEARLY RETURNS YEAR BEGINNING PRICE ENDING PRICE GAIN OR LOSS PERCENTAGE GAIN OR LOSS 2004 2003.37 2175.44 172.07 8.59% 2005 2175.44 2205.32 29.88 1.37% 2006 2205.32 2415.29 209.97 9.52% 2007 2415.29 2652.28 236.99 9.81% 2008 2652.28 1577.03 -1075.25 -40.54% 2009 1577.03 2269.15 692.12 43.89% 2010 2269.15 2652.87 383.72 16.91% 2011 2652.87 2605.15 -47.72 -1.80% 2012 2605.15 3019.51 414.36 15.91% 2013 3019.51 4176.59 1157.08 38.32% Introduction The NASDAQ stock market is an American securities exchange that is the second largest securities exchange worldwide by market value capitalization after the New York Securities exchange. Started in 1971, the stock market has... STOCK MARKET ...
6 Pages(1500 words)Assignment

Week 1 CYB

...Week CYB Week CYB Tiger Team As an independent group whose objective was to challenge and eventually improve the effectiveness of the security system of Symbolic Motors, the Tiger Team applied the penetration testing aspect of red teaming. This was achieved by viewing the security problems from the point of view of an adversary. The actions of the team are mainly based on wireless and wired hacking, social engineering and entering buildings without being granted legal access by breaking into them. It is through such means that the Tiger Team is able to establish that a skylight on the roof is one of the organisation’s security weaknesses as it will provide them with discrete access into the car dealer’s premises. They challenged...
2 Pages(500 words)Assignment

Week one CYB 634

...Cyber Competition Date Cyber Competition Cyber competition has become a normal daily phenomenon of the education system. Cyber competition is where individuals compete through the internet and results are instantly shown and ranked. Most are timed to ensure the learner is cautious of the time factor. Some have trained professionals who personal check result where others are automated programs that mark and grade students results. Cyber competition provides a forum where learners can test themselves, even before the real exam by taking online exams, hence, making it good value to them. However, it is subject to cheating where some may cheat their way through so that they can win prizes or ranked top. This causes unfairness... Competition Date...
1 Pages(250 words)Assignment

Week 2 Discussion

...Discussion Cyber competitions are an important way to determine the skills and talent of different cyber teams and individuals. These competitions are held to know the competencies and innovative ideas of cyber professionals. Cyber competitions also reflect the interest of students in the development of cyber security mechanisms (Bardas & Ou, 2013). There are different methods and tools to score cyber competitions. My model for scoring cyber competitions would involve awarding points for display of skills and abilities related to projects, completing the tasks within time, completing the tasks with the most suitable and innovative skills, and implementing and maintaining a proper collaborative working mechanism throughout...
1 Pages(250 words)Assignment

Week 2 discussion board

...behavior because it controls the physical aspects of it through the nerve cells or neurons, while, on the other hand, the human soul affects behavior that concerns making ethical and moral decisions. The brain controls the neurons that transmit neurotransmitters. In Chapter 2 of Experience Psychology, King (2013) described several neurotransmitters and their roles in people’s learning, emotions, actions, and other daily functions. Her main point is that the brain affects behaviors through the physical actions of these neurotransmitters that reflect on what people think, feel, and do. The human brain, however, is not the only one working when people make important decisions because the soul helps it make them. ...
1 Pages(250 words)Coursework

Discussion board week 2

...Organizational Management Challenges al Affiliation) The challenges facing the management of organizations today include, marketing communications, like technology advancements that are improving at an alarming rate. It is expensive to manage and install a new system. This is because it requires experts to install the system in the organization. In addition, it requires training employees on the new system that is cumbersome and some employees might be hesitant to adopt the system. It is important for the organization to have a long-term strategy in regards to technology. The management may hire technologists who keep abreast with the emerging technology trends to remain flexible and to take advantage of unforeseen developments... Management...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic CYB Week 2 Discussion for FREE!

Contact Us