5 Feb 2023

106

Footprinting and Scanning Assessment Methodology

Format: APA

Academic level: College

Paper type: Assignment

Words: 628

Pages: 2

Downloads: 0

Some of the powerful tools used by Hackers in forcefully trying to invade an organization include Footprinting and Scanning. Although the use of the two methods occurs less frequently as compared to forgery tools, they nonetheless apply as strong approaches in the hands of a hacker. As such, the same tools can be employed in counter efforts against attempts at unethical hacking of the organization’s database. Various organizations make efforts to acquire the services of professional hackers to serve the role of safeguarding the organization from malicious attacks and thus making their online environment safe. More often than not, such persons make use of Footprinting and Scanning tools to save and safeguard the organization’s valued data ( Gadge & Patil, 2008). 

In the foot printing and scanning technique, the methods used include various steps that form part of the entire process. In my case, the methodology and tools that I would use to conduct the assessment include:

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Encryption 

As a long tested and proven method, the encryption technique effectively works in hiding particular information from cyber-attacks. Further, this technique applies successfully in safeguarding an organization’s digital information and blocking its access to malicious attackers. It also works in avoiding industrial espionage where a rival organization may seek to obtain crucial information within the firm’s database to unfavorably gain a competitive edge. Thus, in my assessment, emphasis will be on the existence of algorithms within the company’s system that hide or protect critical information such as AES or DES. I would extend to using encryption in securing vital information through incorporating it into a different code ( Thomas & Stoddard, 2011).   In effect, it will render any malicious attacker incapable of deciphering the hidden information. 

Shutting Down All Unused Ports 

Failure to pay attention to the open ports in the organization’s system exposes the system to malicious threats. In trying to penetrate an organization’s system, most of the hackers begin with exploring any weak points in the system that can be used as entry points. Unused ports form a major weak point through providing the interface for a different digital system to communicate the organization’s system. Organization frequently overlook the open and unused ports which open a vast loop hole that can be used to forge entry into the system. As such, it remains vital for the organization to frequently monitor all open ports and ensuring prompt shut down of all unused ports ( Gadge & Patil, 2008). 

Limiting publishing 

The major step in the commencement of a forgery attack involves information gathering. Openly displaying various organizational system data may act as a ladder in attacks against the entire system ( Thomas & Stoddard, 2011).   For instance, publishing system usernames used to log into the system through the website can result to immense harm. Therefore, it is important to limit publishing in the organization.

Secure Sessions 

Using secure sessions safeguards user accounts from hacking attempts. Various organizations utilize this security standard for their online portals. In turn, it ensures the removal of all borrowing files such as cookies as soon as the user exits the window. Any attack is thwarted as the portal requires login details every time a user seeks entry into the portal ( Arkin, 1999). 

Avoid online data storage 

Online data storage especially cloud computing has resulted in revolutionary storage procedures. Nevertheless since any critical data stored this way remains accessible online, it means that a successful attack on the account may expose the organization to massive harm. Thus, storing critical information offline offers a better promise of data security ( Arkin, 1999). 

Website Monitoring 

The organization’s website contains plenty of important information that can be obtained through meticulous efforts. Consequently it remains obligatory to frequently conduct website monitoring in detecting any cyber-attacks ( Arkin, 1999). 

Always using genuine software 

Most softwares obtain information and transmit it to a third party. As such, avoiding pirated software safeguards against efforts by hackers to steal the organization’s critical information. Although such softwares require no payment to use, they may be part of a planned attack on the system ( Thomas & Stoddard, 2011).   

Mounting robust firewalls 

Firewalls serve a crucial role in regulating the outgoing and incoming data. Through this function, strong firewalls filter suspicious access requests thus barring all forgery attacks ( Arkin, 1999). 

References

Arkin, O. (1999). Network scanning techniques.   Publicom Communications Solutions

Gadge, J., & Patil, A. A. (2008). Port scan detection. Networks, 2008. ICON 2008. 16th IEEE International Conference , 1-6. 

Thomas, T. M., & Stoddard, D. (2011).   Network security first-step . Cisco Press. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Footprinting and Scanning Assessment Methodology.
https://studybounty.com/footprinting-and-scanning-assessment-methodology-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 182

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 251

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration