will quantify a network in order to map it, ensure everything in the system is reporting correctly, and demonstrate one of the first steps a hacker would take to try to gain access to the system.
Using NMAP, quantify a home or work network. Refer to the Internet to provide guidance on the installation and configuration of NMAP. Then, identify the following:
- The number and type of systems attached to the network (e.g., servers, cameras, workstations, mobile devices, security cameras, and so forth)
- What is on the network
- Who is on the network
- The acceptable use policy or, for a workplace, the policy put out from the company
Compile your findings including screenshots from the NMAP program. Make sure to include the following statement from the asset owner: “Use of these assets are governed by , and .”
TOP ACADEMIC WRITER
He has decades of experience in the education field and has served in the examination boards of some of the top Universities within & outside the United States America.