Attack methodology and countermeasures | Computer Science homework help

Points: 80

Don't use plagiarized sources. Get Your Custom Essay on
Attack methodology and countermeasures | Computer Science homework help
Just from $13/Page
Order Essay

Assignment 1: Attack Methodology and Countermeasures

Criteria

 

Unacceptable

Below 60% F

Meets Minimum Expectations

60-69% D

 

Fair

70-79% C

 

Proficient

80-89% B

 

Exemplary

90-100% A

1. Analyze both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

Weight: 25%

Did not submit or incompletely analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

Insufficiently analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

Partially analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

Satisfactorily analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

Thoroughly analyzed both the scanning methodology that you could use and the countermeasures that a company or organization could use in order to thwart such scanning attempts.

2. Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen tools is most beneficial to you as the penetration tester. Provide a rationale for your response.
Weight: 20%

Did not submit or incompletely analyzed the key tools available for scanning a network. Did not submit or incompletely recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Did not submit or incompletely indicated which of the chosen tools is most beneficial to you as the penetration tester. Did not submit or incompletely provided a rationale for your response.

Insufficiently analyzed the key tools available for scanning a network. Insufficiently recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Insufficiently indicated which of the chosen tools is most beneficial to you as the penetration tester. Insufficiently provided a rationale for your response.

Partially analyzed the key tools available for scanning a network. Partially recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Partially indicated which of the chosen tools is most beneficial to you as the penetration tester. Partially provided a rationale for your response.

Satisfactorily analyzed the key tools available for scanning a network. Satisfactorily recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Satisfactorily indicated which of the chosen tools is most beneficial to you as the penetration tester. Satisfactorily provided a rationale for your response.

Thoroughly analyzed the key tools available for scanning a network. Thoroughly recommended one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Thoroughly indicated which of the chosen tools is most beneficial to you as the penetration tester. Thoroughly provided a rationale for your response.

3. Assess the overall importance of the five (5) major phases of an attack. Select the phase(s) that you believe to be the most important for a security administrator to protect against. Provide a rationale for your selection.

Weight: 20%

Did not submit or incompletely assessed the overall importance of the five (5) major phases of an attack. Did not submit or incompletely selected the phase(s) that you believe to be the most important for a security administrator to protect against. Did not submit or incompletely provided a rationale for your selection.

Insufficiently assessed the overall importance of the five (5) major phases of an attack. Insufficiently selected the phase(s) that you believe to be the most important for a security administrator to protect against. Insufficiently provided a rationale for your selection.

Partially assessed the overall importance of the five (5) major phases of an attack. Partially selected the phase(s) that you believe to be the most important for a security administrator to protect against. Partially provided a rationale for your selection.

Satisfactorily assessed the overall importance of the five (5) major phases of an attack. Satisfactorily selected the phase(s) that you believe to be the most important for a security administrator to protect against. Satisfactorily provided a rationale for your selection.

Thoroughly assessed the overall importance of the five (5) major phases of an attack. Thoroughly selected the phase(s) that you believe to be the most important for a security administrator to protect against. Thoroughly provided a rationale for your selection.

4. Suggest the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Provide a rationale for your response.

Weight: 20%

Did not submit or incompletely suggested the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Did not submit or incompletely provided a rationale for your response.

Insufficiently suggested the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Insufficiently provided a rationale for your response.

Partially suggested the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Partially provided a rationale for your response.

Satisfactorily suggested the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Satisfactorily provided a rationale for your response.

Thoroughly suggested the key countermeasures that a security administrator could take in order to protect a company’s assets from Trojans, viruses, and worms, and impede further damage of an attack. Thoroughly provided a rationale for your response.

5. 3 references 

Weight: 5%

No references provided

Does not meet the required number of references; all references poor quality choices.

Does not meet the required number of references; some references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

6. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 8 errors present 

7-8 errors present

5-6 errors present

3-4 errors present

0-2 errors present

Get 20% Discount on This Paper
Pages (550 words)
Approximate price: -

Try it now!

Get 20% Discount on This Paper

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Australia Assessments has gained an international reputation of being the leading website in custom assignment writing services. Once you give us the instructions of your paper through the order form, we will complete the rest.

Essays

Essay Writing Services

As we work towards providing the best custom assignment services, our company provides assignment services for any type of academic essay. We will help you develop professionally written essays that are rich in content and free from plagiarism.

Admissions

Admission and Business Papers

Our skilled team of professional writers will ensure that we help you craft a remarkable admission essay for your desired Master's program in your institution of choice. We won't stop there. Once you enter the job market, we will be available to secure you a position at your desired worksite by creating an outstanding portfolio or resume.

Editing

Editing and Proofreading

Our editorial team is always available for all editing and proofreading services. They check completed papers by our writers and also provide professional opinions to papers completed by our clients.

Coursework

Technical papers

We harbor professional academic writers with different qualifications in diverse academic fields. As such, we are capable of handling both simple and technical papers. Ensure that you provide us with correct and complete instructions in the order form.