IS411 Assignment week 4

You are the IT Manager of a company that is merging with another larger company, the stakeholders have questions regarding your solution to resolving the, “four step hacking process”?

Advertisements

About RamesesIII

Adjunct Instructor ITT-Tech IT Dept. View all posts by RamesesIII

8 responses to “IS411 Assignment week 4

  • Catherine Childs

    The steps in the hacking process are as follows:

    Footprinting: is the process of accumulating data regarding a specific logical or physical environment.

    Scanning:In this step an intruder scans the evironment to test and validate his assumptions as well as gather more in-depth information.

    Enumeration: is the gathering of specific network data such as user names, shares,registry settings,and hardware configuration.

    Attacking:This is considered to be the last step and the easiest one because the intruder has a clear picture of the environment and its weaknesses.

    I would resolve the four step hacking process by using different technologies. However, there are a number of technologies available to companies to prevent hacking attacks. The most popular tools are Internet firewalls, anti-virus software, intrusion detection systems, and vulnerability assessment tools. Firewalls are used to set up a virtual wall between the Internet and the company’s internal network to repel attackers. Anti-virus software detects and removes computer viruses, worms, and Trojan horses. Intrusion detection systems watch over critical networks and computers looking for suspicious activities, and can alert administrators in the event of an attack. Corporations could also use vulnerability assessment tools to inventory their computing infrastructure and to better understand the existing vulnerabilities of their infrastructure as well.

  • courtland richardson

    If the four steps include, foot printing, scanning, enumeration, attacking, I would attempt to divide my resources among my staff/team so that we could provide adequate support to the issue. Knowing that each member of my team has his/her own individual strengths, I would allow each member to select one of the four steps within the process so that they could support the task to the best of their ability and let each node of the task free to perform reconnoissance as needed to fill the requirements of the task at hand.

    After the allotment of time has passed, I would ask each node to address the team with the findings that have documented thus far and in doing so, I would have a better understanding of where the process where at the time. from this point, qwe could readdress the issue and form our final attack, once again, as one team.

    Allowing team and node work allows a multifaceted approach to the task while allowing my staff/team to address issues on their own. pulling individual strengths will allow each employee to feel a sense of ownership and strengthen their dedication to the task. Pair this with software and hardware tools and we a re sure to provide answers to the stockholders and prevent current and future network attacks.

  • Ryan Brown

    The four-step hacking process involves footprinting, scanning, enumerating, and attacking.

    Footprinting and scanning are to be expected and there is little you can do to prevent them from happening. That doesn’t necessarily mean you should ignore those two steps though. In fact, you should have IDS systems and logging setup so that you can monitor such attempts. This will be valuable evidence in the case of an actual intrusion.

    You should attempt to prevent enumeration and attacks by installing the most recent security patches for your operating systems and other software. The use of access controls should also help prevent enumeration and attacks.

  • Nolan Oribello

    The four step hacking process is 1) Footprinting, 2) Scanning, 3) Enumeration, and 4) Attacking.

    As an IT Manager, I would arrange a meeting with the IT Manager of the larger company and gather information about the security that is already implemented within their organization. I would then invite him to a meeting where we both could address security measures that are in place which would protect both companies during the merger. As far as for securing my end of the merger, I would setup external and internal firewalls to protect the internal network. I would also setup a DMZ for web-facing components, as well as a proxy or bastion host to mask IP addresses of the company network. I would have a networking team set thresholds and baselines, and configure NIDS to scan for suspicious activity.

    With the merger, there will no doubt be concern about the threat from internal employees. Both companies would have to work together to write a formal policy document which will require signatures from employees concerning the sharing of trade secrets and intellectual property. We could then setup ACL’s and Permission groups to protect company resources from unauthorized internal access.

    To further promote security awareness, I would have shareholders and employees briefed on the dangers of social engineering. I would let shareholders know that the company will never be completely secure and safe from hackers and hacking attacks, but that our companies can work together to ensure the best security possible.

  • Mylo Collier

    For the four steps of hacking which are: Footprinting:the process of accumulating data regarding a specific logical or physical environment.

    Scanning:In this step an intruder scans the evironment to test and validate his assumptions as well as gather more in-depth information.

    Enumeration:the gathering of specific network data such as user names, shares,registry settings,and hardware configuration.

    Attacking:This is considered to be the last step and the easiest one because the intruder has a clear picture of the environment and its weaknesses.

    I would assure the stakeholders that I would be taking all the nessecary precautions to protect us from these attack. I would mention the use of firewalls, bastion hosts, anti virus software and IDS systems that I would be using to protect the network. To go along with all of the hardware and software there would also be regular audits to make sure that all of the equipment is working properly.

  • Robert Wooldridge

    The Four steps of the hacking process are: Foot printing, Scanning, Enumeration, and attacking.

    I would use an IDS to monitor and log foot printing and scanning attempts, this can be useful information if there is a breach. With this information you can watch for patterns that could signal that an attack is coming.
    To help prevent against the Enumeration and attacks I would ensure that all of the latest security patches for all OS’s and Applications that are in use. This will help close known security holes.

  • Tyler Manuel

    The four steps: footprinting, scanning can be monitored with a IDS put in place but can not be stopped due to the nature of them. Enumeration is the easiest to stop with annual training to the work force on proper information security including ones own information, also with the proper systems in place you can stop the majority of outside attacks. The attacks that cannot be stopped or are extremely hard to stop are the inside job attacks which are done by employees with grudges or due to lack of proper securing of their own information.

  • Fred

    Question: You are the IT Manager of a company that is merging with another larger company, the stakeholders have questions regarding your solution to resolving the, “four step hacking process”?
    1. Checking for weaknesses and then getting access to the site or network
    2. Gaining an initial foot hold to or on the network and then establishing some sort of user or root privileges
    3. Covering our tracks and cleaning up after ourselves
    4. Keeping control of our access by either patching or fixing and configuring the system from being intruded upon by less experience hackers and as a result setting off alarms.

    Answer: Hire an outside consultant pen-testing agency to analyze, plan and actively attack our networks defenses and afterwards deliver an after report of what they did and what they compromised with advice and suggestions on what to fix, patch and shore up on the network and then what sort of security policies need to be added and/or appended.
    Have the organizations employees go through a best policies security review about every 6 months to a year at the very least and have them sign completion papers acknowledging that they have participated and understand the review materials.
    Have a policy set up that allows the creation of a request with a valid justification and acknowledgement of the person’s superior of the need for a temporary account and/or higher privileges to perform any needed duties that do not require a permanent account and/or higher privileges. Have a quarterly account audit to determine what accounts are active but not in use to have them purged.
    PW update/changes every 70 days that must be at least 10 characters long with lower, upper case, numbers and unique characters.
    Have all logs simultaneously reported to a log server for systems that are of the most sensitive and highest priority importance so that they can be reviewed in case the system is ever compromised.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: