Submitted by: Submitted by jimmytmach
Views: 46
Words: 797
Pages: 4
Category: Business and Industry
Date Submitted: 02/14/2015 09:04 AM
Jimmy Mach
CIS207
1/11/2015
PENETRATION TEST OF ANDREW AND HAILEY CORPORATION
Andrew and Hailey Corporation is a business that involves large real estate management
and is currently located in Seattle, WA. Their main point of contact for this project is Anna, the
Vice President. We have been selected to perform black-box penetration testing of their
organization; their staff will not be notified of our activities. Testing may extend into the
following listed properties: a five-star hotel, golf courses, tennis courses, and restaurants. The
objective will be to gather any information regarding network infrastructure, topology, and
discovered vulnerabilities. This report will describe at a very high level the steps and
authorizations required to perform the work requested so that we do not breach any federal or
state laws.
We will first outline the state laws pertaining to our act of performing penetration testing.
RCW 9.A52.110 states that a person is guilty of computer trespass in the first degree if the
person, without authorization, intentionally gains access to a computer system or electronic
database of another and the access is made with the intent to commit another crime or the
violation involves a computer or database maintained by a government agency; this would be
considered a class C felony. RCW 9A.52.120 considers computer trespass in the second degree
as acts mirroring that of the first degree minus the intent to commit another crime and without
involving a computer or database maintained by a government agency; this would be considered
a gross misdemeanor. Finally RCW 9A.52.130 states that a person who, in the commission of a
computer trespass, commits any other crime may be punished for that other crime as well as the
computer trespass and may be prosecuted for each crime separately. Mach - 2
Under federal law: “United States Code Section 2511 of Title 18 prohibits the
unauthorized interception, disclosure, and use of wire,...