Expert Academic Assignment Help — Plagiarism-Free, On Time & Confidential — Get Free Quote →
📘 Uncategorized

Western View Hospital (CLIENT) engaged Pruhart Tech to conduct penetration testing against the security controls within its information environment to provide a practica

NU Nurses90 · 📅 March 31, 2026 · ⏱ 3 min read
✍️ Need help with this assignment? Get expert quotes in minutes — free to submit. ✍️ Get Writing Help FREE

Overview

Western View Hospital (CLIENT) engaged Pruhart Tech to conduct penetration testing against the security controls within its information environment to provide a practical demonstration of those controls’ effectiveness, as well as to provide an estimate of their susceptibility to exploitation and data breaches. The test will be performed in accordance with Pruhart Tech’s information security penetration testing methods. Pruhart Tech’s information security analyst (ISA) will conduct all testing in coordination with CLIENT’s information technology (IT) staff members to ensure safe, orderly, and complete testing within the approved scope. CLIENT’s information environment is protected by endpoint antivirus and administrative controls managed by an active directory. The environment contains numerous potential vulnerabilities, which makes CLIENT susceptible to data breaches and system takeovers. Highly important files that contain HIPAA and payment information may be easily accessible and very visible, putting CLIENT at great risk of compliance violation and potentially subject to large fines or loss of business reputation.

Extent of Testing

CLIENT engaged Pruhart Tech to provide the following penetration testing services:

·        network-level technical penetration testing against hosts in the internal networks

·        network-level technical penetration testing against internet-facing hosts

·        social engineering phone phishing against CLIENT employees

 

Testing Internal Assets

Pruhart Tech’s ISA will conduct various reconnaissance and enumeration activities. This will include port and vulnerability scanning, as well as other reconnaissance activities, to try to reveal any security holes, particularly vulnerabilities, that allow complete system takeover on important servers, most critically the McAfee security server for which a compromise could allow a potential attacker to render the endpoint security for the entire internal network inoperable or ineffective. If server compromise can be achieved, directory traversal will be conducted to search for important data such as private patient data. The ISA will use a secure sensor deployed inside CLIENT’s facilities to conduct port, service, and vulnerability scanning, as well as other reconnaissance techniques within CLIENT’s internal networks. Social Engineering Toolkit (SET) will be used to gain root-level access to multiple critical systems, including the McAfee security server. Testing External Assets

The external phase of the penetration test will focus on the assets that are publicly accessible. Reconnaissance and scanning will be conducted to identify opportunities for intrusion or malicious modification of the systems. Attacks will be launched from Pruhart Tech’s network via internet to the externally accessible assets at Western View Hospital using Burp Suite and network scanner Nmap 4.2.

To determine and practically demonstrate the feasibility of gaining physical access to facilities’ non-public and high-security zones or gaining unauthorized, authenticated access to CLIENT’s workstations, the ISA will conduct phone-based social engineering. Pruhart Tech’s social engineer will perform phone-based social engineering with the goal of getting credentials or having CLIENT staff perform tasks on their workstation. This is intended to simulate a malicious actor attempting to gain credentials and a foothold in the environment by a phone call. Pruhart Tech’s social engineer will call CLIENT staff members claiming to be a technical support worker authorized to contact CLIENT’s personnel to provide critical support. If challenged, the social engineer will then drop information security staff member names in a statement that they are working on their behalf. The social engineer’s program will include the following activities:

·        requesting that the user provide their domain username

·        feigning an attempt to perform a technical operation on the user’s behalf, and then requesting that the user provide their domain password when the operation “fails”

 

Plagiarism Free Assignment Help

Expert Help With This Assignment — On Your Terms

  • ✓ Native UK, USA & Australia writers
  • ✓ 100% Plagiarism-Free — Turnitin report included
  • ✓ Deadline from 3 hours
  • ✓ Unlimited free revisions
  • ✓ Free to submit — compare quotes
NU
StudyLink Expert
Academic Expert · StudyLink
Expert academic writer and education specialist helping students in the UK, USA, and Australia achieve their best results.
Need help with your own assignment?

Our expert writers can help you apply everything you have just read — to your actual assignment, brief, and marking criteria.

Get Expert Help Now →
📝 Free Submission — No Card Required

Need Help With This Assignment?

Our verified experts deliver 100% original, plagiarism-free work to your exact brief and marking criteria. Submit free — compare quotes — choose your expert.

  • ✓ UK, USA & Australia experts
  • ✓ Deadline from 3 hours
  • ✓ Free Turnitin report
  • ✓ Unlimited free revisions
✍️ Write My Assignment FREE Get A Free Quote →

No credit card · No commitment · First quote in minutes

You May Also Find Helpful
View All Articles →
📘
Uncategorized

Research DGA

November 11, 2025 ⏳ 1 min read