Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

PLEASE DO NOT COPY PASTE FROM CHEGG/OTHERWISE I'LL REPORT YOU OR GIVE OU A DISLIKE #4 1. Jhon Karlos was a member of IT team

PLEASE DO NOT COPY PASTE FROM CHEGG/OTHERWISE I'LL REPORT YOU OR GIVE OU A DISLIKEimage text in transcribed

#4 1. Jhon Karlos was a member of IT team of Ruffel Corporation. Due to his illegal activities, he was fired from the organization. For taking the revenge, he like to attack the networking system of Ruffel Corporation. Since he has a knowledge of their IT infrastructure, he knows there is a monitoring system that detects suspicious activities and generates alerts when they are detected. Based upon these alerts, a security operations center (SOC) analyst or incident responder can investigate the issue and take the appropriate actions to remediate the threat. a) Figure out the four techniques that Jhon Karlos may apply to bypass the check detection? b) Describe one evasion technique of the above with Diagram. 2. Network scanning refers to a set of procedures for identifying hosts, ports, and services in a network. It is one of the components of intelligence gathering an attacker uses to create a profile of the target organization. a) Please answer the following questions: i) Discuss 02 (two) scanning techniques with diagram that only work with Operating Systems implemented on RFC- 793 TCP/IP. ii) Identify a scanning technique by which it can scan the existence of stateful firewall in the target network and also able to perform port scanning. Illustrate with a diagram. b) In 2020, your organization is experiencing a number of IP spoofing attacks from different subnet. As a Chief Information Security Officer, what type to detection technique you will advise to the IT department to counter the given attack. Discuss your nominated detection technique with a diagram

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Task 3: Implement releaseAllocatedResources() member method

Answered: 1 week ago

Question

Explain how to build high-performance service delivery teams.

Answered: 1 week ago

Question

Understand what a service-oriented culture is.

Answered: 1 week ago