Reading: §4, 5–5.2.1
Assignment: Program 2, due April 27, 2015; Homework 2, May 1, 2015
The TaskImportant note: This is not an assignment for this class. I am only asking what you think of it. The assignment is reported on the web at http://isc.sans.org/diary.php?storyid=1155.
Student is to perform a remote security evaluation of one or more computer systems. The evaluation should be conducted over the Internet, using tools available in the public domain.
What the student must submit
In conducting this work, you should imagine yourself to be a security contracted by the owner of the computer system(s) to perform a security evaluation.
The student must provide a written report which has the following sections: Executive summary, description of tools and techniques used, dates and times of investigations, examples of data collected, evaluation data, overall evaluation of the system(s) including vulnerabilities.
|You can also obtain a PDF version of this.||Version of April 22, 2015 at 3:36PM|