Quick Questions

0 comments

Please include the question before the answer and references.

 

  • Explain what you believe is the greatest source of information for hackers in the footprinting stage, including where this information is commonly found and how a hacker is able to obtain it. Justify your response.
  • Determine whether or not you believe a company could implement better practices to control its information that is in the public, such as those found through search engines. Formulate at least one best practice that could help protect information that would otherwise be made public.
  • Compare and contrast footprinting and port scanning. Determine which you believe is the more important step in the hacking process and explain why. Evaluate whether or not you believe these processes are more difficult for an enterprise. Justify your answer.
  • Discuss the tools’ primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether hackers and / or security personnel commonly use the tools. Compare and contrast the two selected tools and explain why you would consider utilizing one of these tools over the other.
  • Suppose your corporate commercial Website server is located in a demilitarized zone (DMZ) so that potential and existing customers can access it. Explain the steps you would take to secure the Web server and the data that your potential / existing customers enter on the Website, and determine the ramifications of not protecting that data.
  • Describe how you would implement a security program corporately to ensure that threats such as the Open Web Application Security Project (OWASP) top 10 are successfully mitigated.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}