The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.
Please complete the scenario below following these guidelines for your deliverable.
• Your assignment must be a minimum of 2 pages double spaced, plus a title page and a reference page for a total of 4 pages.
• Make sure you are using at least two (2) academic references.
Scenario:
You have been hired as a consultant to perform a network security assessment for a large firm - you will be focusing on Footprinting and Scanning the organization.
1. Describe the methodology and tools you would use to conduct your assessment.
2. Give a rationale for each step in your methodology.
(Note: You are not limited to following the methodology/tools described in your textbook. If there are additional steps you would take in conducting your assessment, please list them and explain why you are taking them.)
Submission Instructions:
This submission should be created following APA 6th edition guidelines.
2 pages double spaced, 1 title page, 1 reference page.
The reference below is the chapter 6 pdf that was attached.
Gibson, Darril. Managing Risk in Information Systems, 2nd Edition. Jones & Bartlett Learning, 07/2014. VitalBook file.
Attachment:- Performing a Risk Assessment.rar