{"id":34807,"date":"2024-10-13T01:46:31","date_gmt":"2024-10-13T01:46:31","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/assignment-lab-ethical-hacking-performing-passive-reconnaissance-on-a-target-organization\/"},"modified":"2024-10-13T01:46:31","modified_gmt":"2024-10-13T01:46:31","slug":"assignment-lab-ethical-hacking-performing-passive-reconnaissance-on-a-target-organization","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/assignment-lab-ethical-hacking-performing-passive-reconnaissance-on-a-target-organization\/","title":{"rendered":"Assignment: Lab: Ethical Hacking: Performing passive reconnaissance on a target organization"},"content":{"rendered":"<p><span style=\"cursor: auto; color: inherit;\">Perform research on the Internet to understand security threats and attack vectors in a Bring Your Own Device (BYOD) scenario. How could passive reconnaissance be done in this type of environment? What security controls would you recommend implementing to avoid this type of passive reconnaissance?<\/span><\/p>\n<div><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"margin-bottom: 1.5rem; cursor: auto; color: inherit;\">\n<div style=\"line-height: 1.5; cursor: auto; color: inherit;\">\n<div style=\"padding-top: 0.375rem; font-size: 1rem; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\"><\/p>\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"assignments-2-assignment-toggle-details-text\">\n<h2 style=\"padding: 30px 0px 0px; font-weight: 700; font-size: 24px; line-height: 30px; cursor: auto;\">Competencies Measured<\/h2>\n<p style=\"margin: 12px 0px; line-height: 1.625; cursor: auto; color: inherit;\">By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and assignment criteria.<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 6px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 1:<\/strong>&nbsp;<strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Describe the core concepts, technologies, components, and security issues related to mobile and wireless networks.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Apply your internet research findings to analyze core concepts and applied technologies regarding security threats and attack vectors in a Bring Your Own Device (BYOD) context.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 3:&nbsp;Analyze how mobile systems operate to facilitate secure data access and voice.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Describe performing passive reconnaissance on a target organization in a lab context.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Recommend security controls to implement to avoid identified passive reconnaissance in a Bring Your Own Device (BYOD) context.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 4:&nbsp;Apply network defense tools to identify and mitigate mobile network security concerns.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Complete the lab tasks as described in the lab learning objectives.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Describe how passive reconnaissance can be applied in a Bring Your Own Device (BYOD) context.<\/li>\n<\/ul>\n<\/li>\n<li style=\"cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Competency 6:&nbsp;Exhibit proficiency in writing, critical thinking, and research topic areas in real-life data communication networks.<\/strong>\n<ul style=\"margin-right: 0px; margin-left: 25px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Convey clear meaning through appropriate word choice and usage.<\/li>\n<li style=\"cursor: auto; color: inherit;\">Organize content so ideas flow logically with smooth transitions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\" data-testid=\"rubric-tab\">\n<div style=\"margin: 0px 0px 1.5rem; cursor: auto; color: inherit;\">\n<div style=\"line-height: 1.5; cursor: auto; color: inherit;\"><\/p>\n<div style=\"padding-top: 0.375rem; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Perform research on the Internet to understand security threats and attack vectors in a Bring Your Own Device (BYOD) scenario. How could passive reconnaissance be done in this type of environment? What security controls would you recommend implementing to avoid this type of passive reconnaissance? Competencies Measured By successfully completing this assignment, you will demonstrate [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/34807"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=34807"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/34807\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=34807"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=34807"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=34807"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=34807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}