logo

Cyber Security : Assignment PDF

   

Added on  2021-10-01

12 Pages2865 Words251 Views
1
Running head: CYBER SECURITY
Cyber Security
Student’s Name
School Affiliation

2
CYBER SECURITY
Table of Contents1.Question 6...........................................................................................................................................2
2.Question 8...........................................................................................................................................4
3.Question 9...........................................................................................................................................6
4.Question 10.........................................................................................................................................8
5.References...........................................................................................................................................9

3
CYBER SECURITY
1. Question 6
a) Analyze and explain footprinting in network security. [5 Marks]
Footprinting refers to a process of assembling information concerning a given network set up,
normally with the intention of looking for techniques to get into the environment. Footprinting
can depict the system accountability as well as advancing the ease with which they can be
utilized. Footprinting is the technique by which intruders aim at an organization and deploy
remote access procedure to accumulate proprietary data significant to the firm’s Internet as well
as network processors (Moustafa and Slay, 2016). They also reach the firm’s profiles with the
aim of mapping out the focused firm’s security stance. Footprinting utilizes queries such as “who
is” method that generates the employee phone number, names as well as other data upon request
from the attacker. The areas intended by the hackers in a network includes Domain Name
Systems (DNS) as well as Internet Protocol (IP) so as to get the addresses, Firewall meant to
secure the system from outside intrusion and quick steps generally linked with corporate
acquisitions as well as successful broadcasting of this attained data on the Internet, mass media
as well as Intranets. When firms gain other companies, various information is produced that
become public data which are of focus to the attackers. In addition, footprinting is relevant to
systematically and structurally guarantee that all pieces of data are established and it must be
carried out appropriately and in a monitored fashion.
b) Evaluate how different tools (at least 3) can be used for footprinting with examples. [5
Marks]
Wayback machine – this one of the tools that are utilized to gather information on a past
version of the website. A web program produced by the archive of the internet that is capable of

4
CYBER SECURITY
taking snapshots of a website at a uniform interval and makes them present to anyone who is in
pursuit. By the use of Wayback, machine one can recover data that was posted to a website
earlier. When a website URL is an input into the Wayback Machine, the website will return a
various date showing when a site was archived with an asterisk close to every date on which a
modification was done (Xue, Huang, and Zhang, 2016). However, the internet archive does not
preserve exhaustive outcome on each website, the site does archive can cover all the way to as
early as 1996.
Whois Footprinting – it refers to the name of the protocol which is utilized to examine the
servers managed by Regional Internet Registries, that hold data about each resource, that is,
Internet Protocol address or Name of the Domain registered on the Internet. The data that can be
captured about a resource are like name of the owner of the company, address of the owner of
the company, phone number, Internet Protocol address range that a given Ip belongs to, contact
email, name servers as well as the name of the administrator (Han and Kim, 2015). The tool
obtains the correct internet registrars so as to find data on the owners of the aimed Internet
Protocol address as well as domain.
Email Footprinting – is deployed to control the delivery of the emails to the targeted recipient,
intruders track emails to collect information about an intended recipient so as to carry out a
social engineering as well as other attacks (Alipour, Al-Nashif, Satam, and Hariri, 2015). It aids
in getting the details of the recipients such as the Internet Protocol address of the recipient,
recipients’ geolocation, the email was delivered and viewed, checks whether or not the client
visited every link delivered to them, gains the browser and working framework details of the
recipients as well as the time consumed on viewing the emails.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security - Assignment PDF
|8
|2242
|71

Network Security Policy .
|11
|3019
|463

Ethical Hacking - Footprinting
|4
|450
|68

Cybersecurity: Footprinting, Scanning, Enumeration, and Obfuscation Tools
|11
|1105
|345

Network Security Executive Summary 2022
|10
|2381
|9

Internet of Things Information Security
|8
|1630
|308