Description
Using the South University Online Library or the Internet, search and read at least three articles on computer crime prosecutions.
In a 2- to 3-page Microsoft Word document, summarize the articles and analyze key features of the decisions, investigations, or laws you find in your research on computer crime prosecutions.
Cite the articles in APA format.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Excellent! Definitely coming back for more study materials.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
SQL Solution and the Screenshot Project
i need help to solve the requirements from the paper for CS database design. Please see the attachmentBe sure to submit th ...
SQL Solution and the Screenshot Project
i need help to solve the requirements from the paper for CS database design. Please see the attachmentBe sure to submit the following two items:1. A record of which queries you used to complete the questions.2. The screenshot of your final table requested in #10.
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the in ...
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the information security industry, and will be the
culmination of your work in IT 320. This is your opportunity to bring all that you have learned together to analyze a network, evaluate vulnerabilities and risks,
and recommend mitigation strategies.
A vulnerability report typically includes the following:
A security assessment of a computer network
Identification of vulnerabilities, supported with evidence
An interpretive analysis of risks, including benchmarking or ranking risk using levels or similar metrics
Recommended mitigation steps or solutions
Vulnerability reports are written for a diverse audience within an organization. Therefore, they include an executive summary for managers and decision-makers
as well as technical data for analysis by other IT professionals. Organizations may require vulnerability reports to meet compliance requirements or may have
internal policies that call for a vulnerability assessment and completion of a report on a fixed schedule.
Vulnerability reports are often researched and produced by information security experts from outside the organization. As you will see in the assignment prompt
below, you will play the role of an information security consultant as you complete this final project.
Your work on this project is supported by two milestones, in Modules Three and Five, that are designed to support you as you go through the final project lab
and gather the information you need to create your vulnerability report draft. These milestones are important practice opportunities from which you will gain
critical feedback that will inform your final draft of this project that you will submit in Module Seven.
Your practice work and your instructor feedback will be especially important as you craft your executive summary for this project. This executive summary
section is not contained within the milestone activities. It would not make sense to create that final summary piece until you have completed your drafts,
received your instructor feedback, and are ready to finalize your final project draft in Module Seven.
In this assignment, you will demonstrate your mastery of the following course outcomes:
IT-320-01: Assess in-house, distributed, or cloud-based networks for their current security posture
IT-320-02: Recommend mitigation strategies for hardening network operating systems, applications, and network devices based on National Institute of
Standards and Technology (NIST) standards
IT-320-03: Implement network hardening solutions for addressing vulnerable network security postures
2
IT-320-04: Interpret data from networking and system logs for building security assurance
Prompt
ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes.
Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was
unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should
be allowed from outside of the network.
Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Provide background information and the high-level findings of your report to establish a detailed context based on your
assessment of the network, the evidence you collected (your Milestone One work), and the mitigation strategy, recommendations, and solutions
(your Milestone Two work) you addressed.
a) What is the purpose of the vulnerability report? How should it be used and interpreted by the enterprise? [IT-320-02]
b) What was your methodology for identifying security vulnerabilities? This is where you should briefly describe the tools and techniques
that you used to find the vulnerabilities. [IT-320-01]
c) Overall, what was your determination about the enterprise’s current security posture. [IT-320-01]
II. Network Assessment – Gathering Evidence of the Vulnerabilities:
In this part of your project, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate
scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please
see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that
environment. Be sure your responses and supporting evidence address the following questions:
a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with
evidence. [IT-320-01]
b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or
unused? Support your response with evidence. [IT-320-01]
c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence. [IT-320-01]:
i. What kinds of antivirus software, malware protection, or other security software is in place?
ii. What are the risks associated with the gaps in malicious software prevention?
iii. What are the risks associated with leaving the malicious software prevention strategies as they are now?
d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with
evidence from your Wireshark and NetworkMiner tools. [IT-320-01]
3
III. Vulnerability Assessment – Interpreting Evidence of Vulnerabilities:
In this part of your project, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security
vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the
output from these tools. Be sure your responses and supporting evidence address the following questions:
a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain
what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? [IT-320-04]
c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose.
For example, what did you find when you used the OpenVAS tool? [IT-320-04]
d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
IV. Network Security Posture Recommendations:
In this area, you will identify what aspects of the network should be examined to address the network security posture. Use your knowledge from
research, readings, and activities in the course to help you. For Parts e and f, it may be helpful to organize your information in a table format for
organizational purposes. A sample is provided for you in the Supporting Information section.
a) Identify key aspects of the network that should be examined to address the network security posture ensuring the following key criteria have
been included: [IT-320-03]
i. At least one issue associated with the firewall
ii. At last one issue associated with one or more client machines
iii. At least one issue associated with one or more server machines
iv. At least one issue associated with a Windows host
b) Indicate the impact of the vulnerability. [IT-320-03]
c) Indicate the likelihood of the vulnerability. [IT-320-03]
d) What mitigation strategies do you recommend be implemented for addressing all of the issues uncovered in your network assessment
above? Support your response with evidence from your lab work and coursework. [IT-320-02]
e) Prioritize the recommended strategies for the company. Use the matrix in the Supporting Information section to assess the priority. [IT-
320-02]
f) Explain the rationale of the prioritization you have chosen for each solution. [IT-320-02]
V. Implementation Solutions:
In this area, you will add a brief written summary following your charts that demonstrates you actually implemented the solutions you
recommended in your lab environment. Your written responses should include evidence in the form of a screenshot or screen capture that
demonstrates you have executed your proposed recommendations.
a) Execute your proposed strategy specific to at least one of the issues you have uncovered with firewalls and support your response with
evidence. [IT-320-03]
b) Harden the server(s) using at least one method and support your response with evidence. [IT-320-03]
establish a WAN connectivity between your local offices across town, computer science homework help
You would like to establish a WAN connectivity between your local offices across town. You are considering the use of a wi ...
establish a WAN connectivity between your local offices across town, computer science homework help
You would like to establish a WAN connectivity between your local offices across town. You are considering the use of a wireless solution. Complete and document research on the technology available to support the establishment of a WAN. Your document should address the following:At least 2 available solutionsBenefits of this form of implementingCosts associated with the implementation of each solutionA summary of 3 paragraphs stating which solution you have decided to implement and what motivated the decision
Cumberlands Foxton Forensics Browser History Capturer Research Paper
Your research paper should include detailed descriptions of the web browser forensic tool you used and web browser. In add ...
Cumberlands Foxton Forensics Browser History Capturer Research Paper
Your research paper should include detailed descriptions of the web browser forensic tool you used and web browser. In addition you should described your methodology in detail on what you did and end with your analysis and results and conclusion. Your research paper should include an introduction, background (which should be a discussion on your web browser forensic tool and web browser), methodology (this is your approach on what you did, a brand new website you visited that serves as your analysis, etc) your analysis (this is your web browser tool in action with screenshots), findings (this is what you found using your web browser forensic tool), conclusion, references.
5 pages
Phase 1
The RockStar Corp has ensures thattheir ip does not indicate any successful connection because none of the fping commands ...
Phase 1
The RockStar Corp has ensures thattheir ip does not indicate any successful connection because none of the fping commands worked. The following are ...
ITCO 650 AIU Online Upgrading the Network Infrastructure Discussion
Your company is in the process of upgrading the network infrastructure, which involves moving from a 10BaseT to 100BaseT n ...
ITCO 650 AIU Online Upgrading the Network Infrastructure Discussion
Your company is in the process of upgrading the network infrastructure, which involves moving from a 10BaseT to 100BaseT network. Currently, they use Bus topology in the network. As a member of the data network team, you are asked to take care of a portion of this upgrade. And, you would also like to suggest they move from Bus topology to Star topology.Justify your suggestion to update to Star topology?What updates you would have about network hardware in order to move to 100BaseT?How would you provide the best desktop connectivity for end users, and the fastest possible throughput and security for the payroll department?In addition, decide what type of devices to use in the closet. Write a 2-4 page paper using the APA style that summarizes your findings, and provides enough detail to fully support your opinion and any arguments.
Similar Content
computer based analysis homework
please solve the attached questions clearly and completely ...
NECBF Cybersecurity Creating Company Email & Wifi Internet Use Policies Essay
Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final...
Lamar University Emerging Concepts Using Blockchain and Big Data Paper
There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and high...
Hostage Crisis
In a hostage crises, is it ethical for a government to agree to grant a terrorist immunity if he releases the hostages, ev...
Electronic Evidence Collected from Smartphones Article Key Takeaways
Article : pdf attached with the questionplease summarize at least four key takeaways from this. This can be done in a one ...
Enterprise Systems 6-7 page paper about Enterprise system
Write a 6-7 page paper in which you:Present an overview of the origin and history of the concept.
Describe the current use...
It Compliance Planning.edited
IT has continued to grow with the enhancements in computer-enabled technologies. Organizations are increasingly required t...
Information Systems Investments
a. What is the likely future of access tools? Will they continue to be useful security measures? In your discussion, predi...
Solutions
...
Related Tags
Book Guides
Shattered - Inside Hillary Clintons Doomed Campaign
by Amie Parnes and Jonathan Allen
Fahrenheit 451
by Ray Bradbury
Herzog
by Saul Bellow
Big Magic
by Elizabeth Gilbert
Catch-22
by Joseph Heller
Robinson Crusoe
by Daniel Defoe
Into the Wild
by Jon Krakauer
The Magic Mountain
by Thomas Mann
Good Kids Bad City
by Kyle Swenson
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
SQL Solution and the Screenshot Project
i need help to solve the requirements from the paper for CS database design. Please see the attachmentBe sure to submit th ...
SQL Solution and the Screenshot Project
i need help to solve the requirements from the paper for CS database design. Please see the attachmentBe sure to submit the following two items:1. A record of which queries you used to complete the questions.2. The screenshot of your final table requested in #10.
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the in ...
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the information security industry, and will be the
culmination of your work in IT 320. This is your opportunity to bring all that you have learned together to analyze a network, evaluate vulnerabilities and risks,
and recommend mitigation strategies.
A vulnerability report typically includes the following:
A security assessment of a computer network
Identification of vulnerabilities, supported with evidence
An interpretive analysis of risks, including benchmarking or ranking risk using levels or similar metrics
Recommended mitigation steps or solutions
Vulnerability reports are written for a diverse audience within an organization. Therefore, they include an executive summary for managers and decision-makers
as well as technical data for analysis by other IT professionals. Organizations may require vulnerability reports to meet compliance requirements or may have
internal policies that call for a vulnerability assessment and completion of a report on a fixed schedule.
Vulnerability reports are often researched and produced by information security experts from outside the organization. As you will see in the assignment prompt
below, you will play the role of an information security consultant as you complete this final project.
Your work on this project is supported by two milestones, in Modules Three and Five, that are designed to support you as you go through the final project lab
and gather the information you need to create your vulnerability report draft. These milestones are important practice opportunities from which you will gain
critical feedback that will inform your final draft of this project that you will submit in Module Seven.
Your practice work and your instructor feedback will be especially important as you craft your executive summary for this project. This executive summary
section is not contained within the milestone activities. It would not make sense to create that final summary piece until you have completed your drafts,
received your instructor feedback, and are ready to finalize your final project draft in Module Seven.
In this assignment, you will demonstrate your mastery of the following course outcomes:
IT-320-01: Assess in-house, distributed, or cloud-based networks for their current security posture
IT-320-02: Recommend mitigation strategies for hardening network operating systems, applications, and network devices based on National Institute of
Standards and Technology (NIST) standards
IT-320-03: Implement network hardening solutions for addressing vulnerable network security postures
2
IT-320-04: Interpret data from networking and system logs for building security assurance
Prompt
ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes.
Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was
unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should
be allowed from outside of the network.
Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Provide background information and the high-level findings of your report to establish a detailed context based on your
assessment of the network, the evidence you collected (your Milestone One work), and the mitigation strategy, recommendations, and solutions
(your Milestone Two work) you addressed.
a) What is the purpose of the vulnerability report? How should it be used and interpreted by the enterprise? [IT-320-02]
b) What was your methodology for identifying security vulnerabilities? This is where you should briefly describe the tools and techniques
that you used to find the vulnerabilities. [IT-320-01]
c) Overall, what was your determination about the enterprise’s current security posture. [IT-320-01]
II. Network Assessment – Gathering Evidence of the Vulnerabilities:
In this part of your project, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate
scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please
see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that
environment. Be sure your responses and supporting evidence address the following questions:
a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with
evidence. [IT-320-01]
b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or
unused? Support your response with evidence. [IT-320-01]
c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence. [IT-320-01]:
i. What kinds of antivirus software, malware protection, or other security software is in place?
ii. What are the risks associated with the gaps in malicious software prevention?
iii. What are the risks associated with leaving the malicious software prevention strategies as they are now?
d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with
evidence from your Wireshark and NetworkMiner tools. [IT-320-01]
3
III. Vulnerability Assessment – Interpreting Evidence of Vulnerabilities:
In this part of your project, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security
vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the
output from these tools. Be sure your responses and supporting evidence address the following questions:
a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain
what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? [IT-320-04]
c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose.
For example, what did you find when you used the OpenVAS tool? [IT-320-04]
d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
IV. Network Security Posture Recommendations:
In this area, you will identify what aspects of the network should be examined to address the network security posture. Use your knowledge from
research, readings, and activities in the course to help you. For Parts e and f, it may be helpful to organize your information in a table format for
organizational purposes. A sample is provided for you in the Supporting Information section.
a) Identify key aspects of the network that should be examined to address the network security posture ensuring the following key criteria have
been included: [IT-320-03]
i. At least one issue associated with the firewall
ii. At last one issue associated with one or more client machines
iii. At least one issue associated with one or more server machines
iv. At least one issue associated with a Windows host
b) Indicate the impact of the vulnerability. [IT-320-03]
c) Indicate the likelihood of the vulnerability. [IT-320-03]
d) What mitigation strategies do you recommend be implemented for addressing all of the issues uncovered in your network assessment
above? Support your response with evidence from your lab work and coursework. [IT-320-02]
e) Prioritize the recommended strategies for the company. Use the matrix in the Supporting Information section to assess the priority. [IT-
320-02]
f) Explain the rationale of the prioritization you have chosen for each solution. [IT-320-02]
V. Implementation Solutions:
In this area, you will add a brief written summary following your charts that demonstrates you actually implemented the solutions you
recommended in your lab environment. Your written responses should include evidence in the form of a screenshot or screen capture that
demonstrates you have executed your proposed recommendations.
a) Execute your proposed strategy specific to at least one of the issues you have uncovered with firewalls and support your response with
evidence. [IT-320-03]
b) Harden the server(s) using at least one method and support your response with evidence. [IT-320-03]
establish a WAN connectivity between your local offices across town, computer science homework help
You would like to establish a WAN connectivity between your local offices across town. You are considering the use of a wi ...
establish a WAN connectivity between your local offices across town, computer science homework help
You would like to establish a WAN connectivity between your local offices across town. You are considering the use of a wireless solution. Complete and document research on the technology available to support the establishment of a WAN. Your document should address the following:At least 2 available solutionsBenefits of this form of implementingCosts associated with the implementation of each solutionA summary of 3 paragraphs stating which solution you have decided to implement and what motivated the decision
Cumberlands Foxton Forensics Browser History Capturer Research Paper
Your research paper should include detailed descriptions of the web browser forensic tool you used and web browser. In add ...
Cumberlands Foxton Forensics Browser History Capturer Research Paper
Your research paper should include detailed descriptions of the web browser forensic tool you used and web browser. In addition you should described your methodology in detail on what you did and end with your analysis and results and conclusion. Your research paper should include an introduction, background (which should be a discussion on your web browser forensic tool and web browser), methodology (this is your approach on what you did, a brand new website you visited that serves as your analysis, etc) your analysis (this is your web browser tool in action with screenshots), findings (this is what you found using your web browser forensic tool), conclusion, references.
5 pages
Phase 1
The RockStar Corp has ensures thattheir ip does not indicate any successful connection because none of the fping commands ...
Phase 1
The RockStar Corp has ensures thattheir ip does not indicate any successful connection because none of the fping commands worked. The following are ...
ITCO 650 AIU Online Upgrading the Network Infrastructure Discussion
Your company is in the process of upgrading the network infrastructure, which involves moving from a 10BaseT to 100BaseT n ...
ITCO 650 AIU Online Upgrading the Network Infrastructure Discussion
Your company is in the process of upgrading the network infrastructure, which involves moving from a 10BaseT to 100BaseT network. Currently, they use Bus topology in the network. As a member of the data network team, you are asked to take care of a portion of this upgrade. And, you would also like to suggest they move from Bus topology to Star topology.Justify your suggestion to update to Star topology?What updates you would have about network hardware in order to move to 100BaseT?How would you provide the best desktop connectivity for end users, and the fastest possible throughput and security for the payroll department?In addition, decide what type of devices to use in the closet. Write a 2-4 page paper using the APA style that summarizes your findings, and provides enough detail to fully support your opinion and any arguments.
Earn money selling
your Study Documents