Discussion 5- Project Process

Question 1: This week you learned about scoping traditional projects.  Compare and contrast scoping activities for traditional and agile projects?  

Question 2:  This week we are learned about estimating task duration.  Of the 6 that were identified, which do you feel will provide the best estimates?  How are estimates gathered in Agile?  Could Agile teams use one of the 6 methods identified? 

[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Readings- Chapter 6 & Chapter 7

Text-

Title: Effective Project Management 

ISBN: 9781119562801 

Authors: Robert K. Wysocki 

Publisher: Wiley 

Publication Date: 2019-05-07 

Edition: 8th Edition

2 to 3 paragraphs

 

 

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.Click on the LINK above to submit your WORD document for this week’s assignment 

The Benefits of Learning Ethical Hacking (Posted in on August 29, 2018)

When Ethical Hacking Can’t Compete

wireless Networking

 

  • Case Study: Interference on WLANs:
    • Unlicensed bands are parts of the radio spectrum that are available nationwide to all users without requiring a license. However, a drawback is that, because there are no licenses, there can be interference between devices. Use the Internet to identify a list of devices that can interference with WLANs in either the ISM or UNII bands.
  • Case Study: Impact of Propagation Behaviors
    • Absorption, reflection, scattering, refraction, and diffraction can all have an impact on RF signal strength. Using the Internet, identify at least three objects or types of materials in each of the five categories that can impact RF signals. Next, research how much the impact is in terms of loss (either dBm or mW).
  • Case Study: Attenuation
    • Attenuation is not limited to wireless LANs, but can also affect wired LANs as well. Research the types of attenuation that can impact wired networks. How can attenuation be measured on a wired network compared to a wireless network? Which is more difficult to uncover? Why? Write a one-page paper on your findings.

 

Writing Requirements

  • APA format, 34 pages in length (excluding cover page, abstract, and reference list)

rs

OSINT Open Source Intelligence

Students are asked to perform reconnaissance on a website using open source tools. During the assignment you are asked to detail the following:

What investigation method are you using and why?

What type of information do you hope to obtain using each of the methods?

In case you cannot find the information you are looking for, please try to

describe briefly why this information could be important to you…

Please provide a description of tools and search methods you have been using

e.g. search queries, configuration options, etc. – the amount of information provided should be sufficient for others to reproduce your results.

When conducting your analysis using Open Source Intelligence (OSINT), please try to establish the following:

information about IP address ranges related to the organization

DNS enumeration

List of internal email addresses

software used by the organization

Previous breaches

Any vulnerabilities which may be present in the IT infrastructure

Assess if the organization was subject to the data breach of any other cybercrime.

IP Address range (check if active with ping)

Email Server (match to pastebin.com)

Operating System Type (use finger)

Hosting Provider

Staff member’s Phone Numbers, personal details, email addresses

Removed web pages use Google cache

Scenario

You have just joined a Dublin-based cyber-security company and you are about to assist one of the engineers with the preparation of a security audit for a client who requires an OSINT report on their company. You have been asked to establish what digital footprint, important to security audit, can be obtained using an open-source intelligence technique.

Choose one from the following two target company websites below: 

www.supermacs.ie or www.apache.ie

 

Hint: As a starting point you could.

Use the following tools in Windows: 

Ping

Tracert
Nslookup , (switches) mx, ptr, ns, A, txt 

Dnslookup 

Use the following tools in Kali Linux: 

NMAP

DIG
Nikto 

Whois 

netcraR 

————————————————————————— 

In your findings you should detail how you acquired your informaion, what tools you used and why, and detail what information you deem as important. 

Your work should use appropriate academic referencing/crediting of supporting research materials and resources.