Performing Reconnaissance 

Performing Reconnaissance and Probing Using Common Tools Overview One of the key components of an information security program is ensuring that potential attacks and anomalous activities are detected in a timely fashion. This action is accomplished using intrusion detection and prevention systems (IDS or IPS). In order to increase security governance and posture, many organizations may also perform penetration and ethical hacking testing, which can be useful in detecting security vulnerabilities before others. Directions Address each of the following : Compare and contrast the uses of NetWitness Investigator and Wireshark used in the lab. Why would a network administrator use Wireshark and NetWitness Investigator together? Interpret the results of the Wireshark and NetWitness scans performed in the lab. Describe the area of network vulnerability found in each scan.  Describe the security risk associated with the vulnerability you discovered. Suggest a security control that you would use to address the vulnerability and explain why it is appropriate. Explain in detail the results returned from the Zenmap reconnaissance. Submission Instructions Submit your assignment in a Word document with well-labeled responses. Length: 3 double-spaced pages Format and Style: Current APA standards. Font: 12 point Times New Roman.

Do you need a similar assignment written for you from scratch? We have qualified writers to help you. You can rest assured of an A+ quality paper that is plagiarism free. Order now for a FREE first Assignment! Use Discount Code "FREE" for a 100% Discount!

NB: We do not resell papers. Upon ordering, we write an original paper exclusively for you.

Order New Solution