Question: Jane is a hacker intent on breaking into the XYZ Corporation. She uses a variety of passive reconnaissance techniques and gathers extensive information about the
Jane is a hacker intent on breaking into the XYZ Corporation. She uses a variety of passive reconnaissance techniques and gathers extensive information about the company. Jane finds out from network administrator questions/comments in user groups the model of routers being used in the company. She finds a complete list of the IT staff and their phone numbers from a personnel directory on the company website. She also finds out what services are running by using a port scan.
Based on this scenario, consider the following questions:
1. What reasonable steps could the company have taken to prevent Jane from finding out router models and other company hardware?
2. What steps should the company take to prevent or at least reduce the efficacy of port scans?
Step by Step Solution
3.44 Rating (151 Votes )
There are 3 Steps involved in it
1 To prevent Jane or any potential attacker from finding out router models and other company hardware information the company could have taken the fol... View full answer
Get step-by-step solutions from verified subject matter experts
