Cyber Security

THIS ANSWER WILL BE PLACED THROUGH TURNITIN

Read “Penetration Testing – Reconnaissance with NMAP Tool,” by Kaur and Kaur, from International Journal of Advanced Research in Computer Science (2017). Refer to this reading when completing Topic 2 DQ2.

Read “Penetration Testing – Reconnaissance with NMAP Tool,” located within the required readings. In the article, the authors discuss two tools for consideration as use for reconnaissance in cyberattacks. Name the tools and explain how they could be used to analyze network security risks, threats, and gaps.