IOT device in house security ?
If you prefer to do some other type attack, eg. Iot device attack and provide the same information, submit the attack for approval. Again, you must be fully aware of how the attack operates and ensure that the attack is only being performed in an isolated environment. You cannot use USC Upstate’s network for any of this. You can come into the lab on campus to use the network in Hodge 266.
3. Submit a paper on preforming a Passive Recon on a domain. Passive does not require you to actually perform any types of attacks. Here you are gathering information. In the paper, diagram out as much of the domain/network as you can find during the recon. Research the IP addresses and the domains. Provide detailed information and screen shots of the information found. What tools did you use to perform the recon? After performing the recon, describe the vulnerabilities discovered and how the vulnerabilities could be used in an attack. Think outside the box on this one. How can non IT information be used?
All options need to include sources used. Copying and pasting of information or improper citing will result in a 0.
There will be a 6 page minimum length required on any papers written. Images can be included; however, be sure to cite images. The paper option will also require a recorded presentation. MLA format
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.