Essay Available:
page:
5 pages/≈1375 words
Sources:
10
Style:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 36.45
Topic:
Project 2: Discovery
Coursework Instructions:
Project 2: Discovery
Hide Assignment Information
Turnitin™
Turnitin™ enabledThis assignment will be submitted to Turnitin™.
Instructions
Complete the relevant section in the Penetration Testing Report. It is highly recommended you reuse the same document you used in the previous project. Again, the section to complete is aligned to the Penetration Testing phase hands-on work you completed in this project.
Attachments
Penetration Testing Report Template.docx (51.97 KB)
Hide Rubrics
Rubric Name: Project 2: Discovery
Competency
Exceeds Performance Requirements
Meets Performance Requirements
Does Not Meet Performance Requirements
1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
2.2: Consider and analyze information in context to the issue or problem.
7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Overall Score
Feedback
Associated Learning Objectives
Learning Objective 7.2.1: Demonstrate ability to identify threats/risks and vulnerabilities taking into account the frequency, probability, speed of development, severity and reputational impact to achieve a holistic view of risk across the entity.
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.2: Demonstrate ability to classify risks according to relevant criteria including, but not limited to: risks under the entity's control, risks beyond the entity's control, risks with prior warnings, and risks with no prior warnings.
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.3: Demonstrate ability to identify the organization's risk exposures from both internal and external sources.
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.4: Explain the proper use of penetration testing and vulnerability scanning for vulnerability assessments.
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.5: Explain the impact of penetration testing and vulnerability scanning on OT systems and know when to use such techniques.
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.6: Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.7: Knowledge of penetration testing principles, tools, and techniques (e.g., metasploit, neosploit).
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.8: Knowledge of system and application security threats and vulnerabilities.
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.9: Knowledge of penetration testing principles, tools, and techniques (e.g., metasploit, neosploit).
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.10: Skill in utilizing exploitation tools (e.g., Foundstone, fuzzers, packet sniffers, debug) to identify system/software vulnerabilities (e.g., penetration and testing).
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.11: Skill in utilizing network analysis tools to identify software communications vulnerabilities.
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Learning Objective 7.2.12: Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.
Assessment Method: Score on Criteria - 7.2: Includes the process of identifying, quantifying, and prioritizing the vulnerabilities in a system. Vulnerability from the perspective of disaster management includes assessing the threats from potential hazards to the population & to infrastructure.
Required Performance: Meets Performance Requirements
Submit Assignment
Files to submit
(0) file(s) to submit
After uploading, you must click Submit to complete the submission.
Coursework Sample Content Preview:
lefttop
FIC BANK
FICBANK SYSTEM
Penetration Testing Plan & Report
Version 1.0
April 2024
Table of Contents TOC \o "1-3" \h \z \u 1.Executive Summary PAGEREF _Toc160094718 \h 42.Rules of Engagement PAGEREF _Toc160094719 \h 42.1.Introduction PAGEREF _Toc160094720 \h 42.1.1.Penetration Testing PAGEREF _Toc160094721 \h 42.1.2.Vulnerability Testing PAGEREF _Toc160094722 \h 52.1.3.Post-Testing Actions PAGEREF _Toc160094723 \h 53.Penetration Testing Methodologies PAGEREF _Toc160094724 \h 63.1.Phase 1: Reconnaissance and Enumeration PAGEREF _Toc160094725 \h 63.1.1.Publicly Available Information PAGEREF _Toc160094726 \h 63.1.2.Service Banner and Fingerprinting Information PAGEREF _Toc160094727 \h 63.1.3.Live Hosts PAGEREF _Toc160094728 \h 63.1.4.Traceroute PAGEREF _Toc160094729 \h 73.1.5.Nmap PAGEREF _Toc160094730 \h 73.2.Phase 2: Vulnerability Discovery PAGEREF _Toc160094731 \h 73.2.1.Live Hosts PAGEREF _Toc160094732 \h 73.2.2.Open Ports and Services PAGEREF _Toc160094733 \h 83.2.3.Nikto PAGEREF _Toc160094734 \h 83.2.4.Nessus PAGEREF _Toc160094735 \h 83.3.Phase 3: Exploitation PAGEREF _Toc160094736 \h 83.3.1.Findings PAGEREF _Toc160094737 \h 93.4.Phase 4: Recommendations PAGEREF _Toc160094738 \h 94.Appendices of Evidence PAGEREF _Toc160094739 \h 104.1.Appendix A – Reconnaissance and Enumeration Phase PAGEREF _Toc160094740 \h 104.2.Appendix B – Vulnerability Discovery Phase PAGEREF _Toc160094741 \h 104.3.Appendix C – Exploitation Phase PAGEREF _Toc160094742 \h 104.4.Appendix C – Post-Exploitation Cleanup Phase PAGEREF _Toc160094743 \h 10
Penetration Testing Plan & Report (PTR)
Prepared By
Organization that Prepared this Document
63417-59000
Organization Name
University of Maryland Global Campus Penetration Testing Team
Street Address
3501 University Blvd East
Suite/Room/Building
City, State, Zip
Adelphi, MD 20783
Prepared For
Organization that Prepared this Document
Organization Name
FICBANK
Street Address
2386 Highway 76
Suite/Room/Building
City, State, Zip
Denver, Colorado 80201
Document Revision History
Version
Date
Pages
Description
Author
1.0
18/4/2024
All
Project 1
Richard Nuwor
1 Executive Summary
FICBANK offers a software as a service (SaaS) cloud service offering to the federal agency Department of University and has retained University of Maryland Global Campus Penetration Testing Team (UMGC PTT) to perform a penetration test (pen test) of FICBANK systems in accordance with all federal laws, regulations, and statues to include the National Institute of Standards in Technology (NIST). The FICBANK pen test is a representation of the security posture as of the end of date of penetration testing (pen testing), prior to any mitigation. This Penetration Test Report (PTR) provides the results of the activities performed and serves as a permanent record of the pen testing activities. The testing including automated and manual activities using the pen testing tool Kali Linux, native operating system tool command prompt, and manual testing.
2 Rules of Engagement
During the pen test, the UMGC PTT will attempt to identify exploitable weaknesses of FICBANK system including but not limited to application flaws, improper configurations, and end-user behavior to evaluate the company’s security policy compliance, employee’s security awareness, and the organization’s ability to identify and respond to security incidents. Findings will be validated, documented, and given an appropriate impact rating when can be found in the Table under the Findings section of this report. The primary goal of this penetration test includes:
List 3-5 goals of penetration testing
* Vulnerability Identification
* Risk Assessment
* Incident Response
1 Introduction
Under the Federal Information Security Management Act of 2002 (FISMA), the Office of Management and Budget (OMB) directed NIST to develop specific guidance for federal agencies and those providing services on behalf of federal agencies, to test and assess the security of their information systems. Network vulnerability assessment and penetration testing of information systems are for all information systems within the federal government. This testing is in accordance with the guidance found in the NIST Special Publication (SP) 800-115, Technical Guide to Information Security Testing and Assessment, which provides specific guidance for conducting these tests and assessments, including guidance for developing Rules of Engagement (ROE).
This ROE establishes guidelines for the UMGC PTT to conduct vulnerability assessments and penetration testing of system and network components throughout the FICBANK enterprise. Within this document and unless otherwise specified, the terms “test” and “testing” refer to both network vulnerability assessment and penetration testing used to evaluate FICBANK systems. This docu...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
👀 Other Visitors are Viewing These APA Essay Samples:
-
Project 1: Reconnaissance
6 pages/≈1650 words | 10 Sources | APA | IT & Computer Science | Coursework |
-
M365 Application Workloads Template
2 pages/≈550 words | No Sources | APA | IT & Computer Science | Coursework |
-
UPDATED PAGES VM Scanner Evaluation Background Report
4 pages/≈1100 words | 3 Sources | APA | IT & Computer Science | Coursework |