Attack Preparation: Search the web for two (2) local business websites (not national chains). Run a port scan on each of them. For each, determine which ones have HTTP, HTTPS running. List these and any other interesting things you find in a few sentences for each web-based free port scanning software available at https://pentest-tools.cometwork-vulnerability- scanning/tcp-port-scanner-online-nmap (Note: If the link doesn't work for some reason, be resourceful That is, search Google for "Pentest port scan" and it should come right up) FTP, SMITP, SMITPS Once you have gathered this information, suggest potential security flaws that may be present on the server you scanned. PLEASE NOTE: You should use either Google Chrome or Mozilla Firefox as a browser for these tests. If it doesn't work from your computer, try another computer. Start this assignment early, so you can get help from a teaching assistant, if necessary Social Engineering: Search the Internet and refer to your readings for effective social engineering techniques. Now, suppose you wanted to obtain access to confidential digital information stored on ervers at a small local company called InfoLeak, Inc. The company is situated in a small town and has less than 100 employees. Of these 100 employees, only 5 are responsible for information technology and network security. The remaining employees are administrative, sales and research/development. The ompany is very open and community-friendly, often holding offsite company meetings and gatherings at ocal bars and restaurants eak, Inc Given your knowledge of social engineering, computer security and the general details of Infol provide a detailed strategy for obtaining the confidential information