Hide Assignment Information Turnitin® This assignment will be submitted to Turnitin®. Instructions This week, you will submit your first project, the System Scan Report. Your report should include the following: Introduction Target System Zenmap Scan OpenVAS Scan Open Socket Connection Recommendations References If you haven’t already done so last week: Follow the instructions to setup your Virtual Machine Hacking Lab. Download the System Scan Report Template and follow the instructions in the?document. Delete the instructional text from the template before you submit. How Will My Work Be Evaluated? 1.2.1: Identify the target audience, the context, and the goal of the communication. Provide a brief introduction explaining the services performed and a summary at the end with the important findings of the scan. Validate your recommendations using industry standard techniques. Include at least two to three references in IEEE format . 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience. Make sure the report to the client contains grammatically correct language without any spelling or typographical errors. Explain industry acronyms when they are introduced since they may be unfamiliar to the client. 10.1.2: Gather project requirements to meet stakeholder needs. The client has asked for a Zenmap scan, an OpenVAS vulnerability scan, and to use other accepted industry practices for the systems scan. You will need to include screenshots and note the application versions that are listed and displayed in the scan results. 12.2.1: Identify systems for the risk assessment. During any scan report, it is critical that you list the IP address of the system you are using to connect to the client’s corporate network (for auditing purposes) as well as the IP address of the system(s) that you are scanning. Discuss the scope of engagement and the limitations of your actions to stay within the parameters of the test. 12.2.2: Perform a risk analysis. Explain to the client the security issues that are present on the Linux system. Discuss critical vulnerabilities that need to be addressed and the measures that may need to be taken to deal with the underlying security issues (additional staff, equipment, billable hours, etc.). 13.1.1: Create documentation appropriate to the stakeholder. In this section, recommend that you and your contractors perform a full penetration test on the target system. Mention the implications (ransomware, exfiltration, credential harvesting, etc.) that might occur if the security issues are not addressed. When you are finished, click “add a file” to upload your work, and then click the Submit button. Hide Rubrics Rubric Name: Project 1 – System Scan Report This table lists criteria and criteria group name in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method.Criteria Exceeds Performance RequirementsMeets Performance RequirementsApproaches Performance RequirementsDoes Not Meet Performance RequirementsCriterion Score 1.2.1: Identify the target audience, the context, and the goal of the communication.10 points Identifies the target audience, context, and goal of the communication in a clear and appropriate manner. 8.5 points Identifies the target audience, the context, and the goal of the communication. 7.5 points Attempts to Identify the target audience, the context, and the goal of the communication, but there are issues with accuracy or appropriateness. 0 points Does not identify the target audience, the context, and the goal of the communication. / 101.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.10 points Uses enhanced vocabulary highly appropriate for the discipline, genre, and intended audience. 8.5 points Uses vocabulary appropriate for the discipline, genre, and intended audience. 7.5 points Attempts to use vocabulary for the discipline, genre, and intended audience, but there a…

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay