Problem: Security Assessments
You have been hired as a consultant to perform a network security assessment for a large firm - you will be focusing on Footprinting and Scanning the organization.
• Describe the methodology and tools you would use to conduct your assessment.
• Give a rationale for each step in your methodology.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.