Network scanning tool
Footprint
There is a scenario that happens a child got lost when they were with her mother in the mall. The child had no phone nor any electronic gadget that would help trace the child since she was young to operate one (Soren,2018). The mall had been experiencing the kidnapping of children in the recent past. The mall administration conducted a thorough search through their CCTV camera and physical searching, but the child was not found. The situation worsened when the day ended without seeing the child within the mall.
I would take a step in identifying the exact spots that they were moving. The items they bought in the mall will give guidelines on their movements. I will dialogue with the mother to provide a full description of the child on clothes that she was wearing and her latest photo (Allen,2017). These details will help dig information about the lost child also have a clue on people who might have seen the child. I will also go through the last crime incidences that are similar to the current loss of the child to help me know people who were involved in being among the first suspects plus their friends. Don't use plagiarised sources.Get your custom essay just from $11/page
Network scanning tool
Paessler Router Traffic Grapher
This is a network monitoring tool that aids in ensuring computer systems are running smoothly and effectively as per the need and requirement of the client. The software also monitors the critical information technology infrastructures. Paessler Router Traffic Grapher analyses traffic using flow protocol and packet sniffing, thus ensuring all variabilities in the network are solved for proper communication (Moghadam at el 2017). Paessler Router Traffic Grapher uses the command Ping to ensure there is communication between devices that are in the same network. It uses Structured Query Language commands in servers to filter data and move it to appropriate datasets where it is supposed to be used.
Paessler Router Traffic Grapher provides alerts when it detects a problem or some unfamiliar metrics; in this way, the network administrator can prevent the attacks by installing appropriate measures in the network (Matoušek, at el 2019). The Paessler Router Traffic Grapher has inbuilt mechanisms that provide notifications like email, push, and Hypertext transfer protocol requests. It has a compressive sensor that monitors the network flow and communication within the local area network. The software has the Xflow tool that troubleshoots the network flow and reduces traffic.
Retrieved from: https://www.paessler.com/prtg
New England College
The site is owned by the college that is located in the united state. It is managed by New England college. The site was registered in 1934, and it will expire this year.
Larry Page and Sergey Brin started this site, but currently, it’s subsidiary holding company alphabet inc that contains Berkshire Hathaway, Apple Microsoft Corporation Alibaba group Tencent Amazon and JPMorgan Chase. The place was registered in 2015, and its expiry date is not defined.
Bank of American, Bank of India your bank
This financial institution is located in America. This website was registered in 2019; its expiry date is not defined. The bank of an American institution manages this site.
United States Government
This site is located in the united states. It is managed by information technology experts in the united states. It was registered in 2018, and its expiry date is not defined.
Target stores
Hackers had intruded into the system of the stores and managed to get about forty million credit, and debit cards of consumer’s data were stolen. This heist showed that there is another degree of making things right in terms of the security arms race that happened between the criminals and the merchants (Plachkinova at el 2019). The customer information was redirected from the store’s mounted cash registers to hackers that they used malicious software.
Criminals had the information of consumers; therefore, they have no trouble making other fake credit cards or similar. The codes that were at hand were enough for criminals to vandalize the worth of the credit that they had (Shu at el 2017). They waited for months so that they can use the cards. Some of the tickets were sold in the black market at a throwaway price, rebranding themselves out of guilt of possessing illegal data. The breach had extended almost all target locations in the nation
The heist started on November twenty-seventh, it was discovered on fifteenth December, taking eighteen days to be found, which was a long duration for losing a lot of money. The target store suffered paying their clients eighteen million dollars to compensate clients whose information was vandalized. Hacking of systems is a cyber-security issue that should be taken into account in a serious note.
Retrieved from: https://krebsonsecurity.com/2013/12/sources-target-investigating-data-breach/
Reference
Allen, R. (2017). Lost and Now Found: The Search for the Hidden and Forgotten. M/C Journal, 20(5).
Soren, S. (2018). Finding the Historical Footprints Underlying the Santal Narrative of Migration. Journal of Adivasi and Indigenous Studies, 8(2), 1.
Moghadam, A. S., Moshiri, B., & Payandeh, A. (2017) Network Situational Awareness and Quantitative Threat Assessment Based on Multi-Sensor Information Fusion.
Matoušek, P., Ryšavý, O., & Grégr, M. (2019, September). Security Monitoring of IoT Communication Using Flows. In Proceedings of the 6th Conference on the Engineering of Computer-Based Systems (pp. 1-9).
Plachkinova, M., & Maurer, C. (2019). Security breach at target. Journal of Information Systems Education, 29(1), 7.
Shu, X., Tian, K., Ciambrone, A., & Yao, D. (2017). Breaking the target: An analysis of target data breach and lessons learned. arXiv preprint arXiv:1701.04940.