It Infrastructure Essay

310 words - 2 pages

One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data ...view middle of the document...

1. What are the differences between ZeNmap GUI (Nmap) and Nessus?ZeNmap is used to map a network and Nessus is used to Test a network for vulnerabilities.2. Which scanning application is better for performing a network discovery reconnaissance probing of an IP network infrastructure? Nmaps sole purpose is just that, network probing and recon.3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus would be a better tool for this operation. While you can find network vulnerabilities with Nmap, it is not used as such.4. How many total scripts (i.e., test scans) does the Intense Scan using ZenMap GUI perform?Port Scanning, OS detection, Version detection, Network Distance, TCP sequence prediction, Trace route5. From the ZenMap GUI pdf report page 6, what ports and services are enabled on the Cisco Security Appliance device? 443/tcp open ssl/http, No exact OS matches for host, Aggressive OS guesses: Cisco Catalyst 1900 Switch, Software v9.00.03 (89%).6. What is the source IP address of the Cisco Security Appliance device (refer to page 6 of the pdf report)? Nmap scan report for How many IP hosts were identifie

Other assignments on It Infrastructure

Regulation Of Below Rail Infrastructure Assets In Queensland: What Can We Learn From The Canadian Experience?

7299 words - 30 pages given amount at a lower average cost than two firms producing half of this amount separately. Hence from a cost point of view, it may be better for only one firm to produce. (See Figure 1) The most notable examples of this are in industries where there are large, fixed costs. In particular, this is likely to be the case for large scale infrastructure assets like water, electricity, telecommunications and the rail, where companies must dig up

Internal Use Only Essay

365 words - 2 pages The following report will address the three main IT infrastructure domains that the Richman Investments “Internal Use Only” data classification policy applies to. “Internal Use Only” is used to classify any internal data shared within our organization that may or may not be confidential in nature but is not intended to leave the company. The three main domains affected by this policy are the User Domain, Workstation Domain, and the LAN Domain


266 words - 2 pages able to address it with a holistic perspective starting from the changes we needed to make on how we collected the data, our indexing infrastructure, and integrating all that efficiently with our ranking algorithms and UI. Explore A year and a half or so ago, the Explore tab would show only popular photos from our community, regardless of your preferences or connections. This experience wasn’t the best and we saw a lot of potential to


5258 words - 22 pages discovered that developing the capability was not as simple as writing or buying a package-tracking application. The company needed to develop networks, databases and processing capacity before it could even begin to offer tracking services.1 At about the same time, Delta Air Lines began focusing essentially all its information-technology spending on rebuilding its airport systems and infrastructure, in part to address Y2K concerns. But shortly after Jan

Creating Shared Value

420 words - 2 pages improve  Cognition   SHG will help to gain their trust Promotion will change their perception  Outcome  Improvement in product feel and trust among the people Intensive Investment  Proposed strategy    Increasing the technical know how of the product Collaborating with SHG and improvement of existing infrastructure Availability of the product Once they start using the product, they will start feeling it

Security Policy

304 words - 2 pages Riordan Manufacturing Security Policy Smith Systems Consulting has been hired to evaluate and consult on the creation of a new information technology security policy to span the complete enterprise infrastructure. This document will serve as a recommendation for Riordan Manufacturing as it pertains to the enterprise wide information security strategy. Riordan Manufacturing currently has three locations within the United States and one

Leveraging The Cloud

1752 words - 8 pages abstracted from consumers, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them. KEY CHARACTERISTICS OF CLOUD COMPUTING On-demand, self-service Ubiquitous access  Location and device independent  Rapid elasticity  Powerful  Intelligent  User / Task centric  Programmable  Pay-per-use   5 5/31/2011 WHY CLOUD COMPUTING ? 16 IT INVESTMENTS NEED TO LEVERAGED

It Securityspecialization

567 words - 3 pages 7 Assessment Worksheet Identifying Threats and Vulnerabilities in an IT Infrastructure Security Risk Management: CSS250-1503A-01 Course Name and Number: _____________________________________________________ Ismael Tirado Student Name: ________________________________________________________________ Shawn Murray Instructor Name: ______________________________________________________________ July 13, 2015 Lab Due Date

Amazon Evolution

829 words - 4 pages Amazon Evolution Melanie Fonseca XBIS/219 July 1, 2012 Venkatash Baglodi Amazon Evolution Amazon is not doing as well as most people may think even though they are the biggest online retailer carrying an excess of annual sales of $10 billion. Amazon has not shown a steady profit growth that investors have been expecting of them, and it is has fallen so much that their profit margin is only about 4.1 percent less than that of Wal

Whats Up

292 words - 2 pages 7-1 -The principal components of telecommunications networks and networking technologies are? -Describe the features of a simple network and the network infrastructure for a large company. A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large

Itt It255 Research Project Part 1

474 words - 2 pages Brian Gobrecht IT255 Project Part 1 The domains of an infrastructure are broken down into several parts. The User, Workstation, LAN, LAN-to-Wan, Remote Access, Wan, and System/Application domains. All of these are a very crucial part of a domain structure and if one fails to do its proper job most of it or all of it will come to a screeching halt. The User Domain is pretty self-explanatory yes a system can do without a user but by itself

Similar Documents

7 Domains Of It Infrastructure Essay

263 words - 2 pages provided or similar documents meeting the intent of the Business Continuity Program. Objective Objective of the Business Continuity program is to ensure that each functional unit has evaluated business conditions and developed plans which will enable it to survive business-interruption events and continue operations at an acceptable level until normal operations can be restored. Responsibility Designated leaders are

Brazil Infrastructure Essay

2742 words - 11 pages been reported that six of the twelve stadiums needed for this event are experiencing delays and will not be completed by the December 31st FIFA deadline. Brazil is struggling to build the infrastructure needed to host both these sporting events. It is critical that transportation and housing are available to accommodate the estimated 500,000 World Cup visitors. Failure to complete the necessary infrastructure improvements would be a massive

Network Infrastructure Essay

5792 words - 24 pages performance and efficiency of the network as a whole, therefore it is very important that an effective and efficient fault tolerance and backup strategy is in place for the network infrastructure to make sure that ion the event of a breakdown or disaster, this services are not failed completely. For this UWS network design, as shown in the network diagram above a backup server will be provided for all the services, so in the event of a breakdown

Assignment 2: Critical Infrastructure Protection

1124 words - 5 pages under the sponsorship of the Undersecretary for Technology. It is concerned with developing technology and maintaining measurement standards to improve promote commerce, productivity, and improve the quality of life in the U.S. NIST oversees four major cooperative programs. The NIST Laboratories advances the national technology infrastructure. The Baldridge National Quality Program was created to boost distinction among United States