The Case Study is presented with details about a fictional company. In this scenario you have been hired as an ethical hacker to test the security of the company. You will define the scope of your...


The Case Study is presented with details about a fictional company. In this scenario you have<br>been hired as an ethical hacker to test the security of the company. You will define the scope of<br>your penetration test, however, there are 3 main goals of this penetration test that you need to<br>determine.<br>1. Is the customer data being stored by the company at risk? Can it be compromised?<br>2. Is the data regarding the supplies of the company safe? Can someone compromise the<br>Inventory Control Systems?<br>3. Is the secret recipe of the brew safe?<br>Your penetration test will not have any limitations other than time. All tests would need to be<br>conducted within the timespan of 72 hours. The test must be completed over a three day<br>weekend and when the company comes back from the weekend, you will need to make a<br>presentation to the company. Your presentation will need to outline the tools you would expect<br>to use during a penetration test along with the output you may find.<br>

Extracted text: The Case Study is presented with details about a fictional company. In this scenario you have been hired as an ethical hacker to test the security of the company. You will define the scope of your penetration test, however, there are 3 main goals of this penetration test that you need to determine. 1. Is the customer data being stored by the company at risk? Can it be compromised? 2. Is the data regarding the supplies of the company safe? Can someone compromise the Inventory Control Systems? 3. Is the secret recipe of the brew safe? Your penetration test will not have any limitations other than time. All tests would need to be conducted within the timespan of 72 hours. The test must be completed over a three day weekend and when the company comes back from the weekend, you will need to make a presentation to the company. Your presentation will need to outline the tools you would expect to use during a penetration test along with the output you may find.

Jun 04, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here