Analyze the potential security concerns

Assignment Help Management Information Sys
Reference no: EM131459697

Discussions

"A Consultant's Viewpoint and Relationships" Please respond to the following:

· Read and reflect upon the "Top Ten - Considerations for Evolving into the Role of a Consultant" in Chapter 5 of Roberts' text. Propose three actions that IT professionals should undertake in order to successfully achieve the Top Ten. Determine the single most paramount consideration, and justify your selection.

· As an IT professional who may face differing and competing priorities from business units, suggest one strategy for negotiating an achievable project scope without damaging the relationship with business units. Support your answer with the steps that you would take in order to implement your strategy.

· Suppose you work as a security analyst and during a weekly meeting your supervisor asks for your opinion about the ways in which the department could best identify vulnerabilities that a hacker could potentially exploit on a network. Analyze the potential security concerns, and identify what you believe to be the greatest concerns in terms of vulnerabilities. Describe the method(s) you would use to identify the related exploit(s). Explain your desired method(s) to perform this vulnerability analysis.

· Suggest the tool(s) that you would use to perform all or a portion of the analysis mentioned in Part 1 of this discussion. Justify the manner in which such tools could assist with these efforts.

· Any current topic or article related to penetration techniques.

· The instructor insight

· Review the attacks listed on the OWASP website, located at https://www.owasp.org/index.php/Category:Attack. Focus on selecting three attacks that you believe to be the greatest security threat, rank what you believe to be the top three greatest security threats (e.g., cookie/session poisoning, platform exploits, etc.), and provide a rationale for your rankings. Explain the key inherent dangers of the chosen threats, and indicate the key reasons why you believe such threats pose more of a risk than other current ones in existence. Justify your answer.

· Review the attacks listed on the OWASP website, located at https://www.owasp.org/index.php/Category:Attack. Focus on selecting three attacks that you believe to be the greatest security threat, rank what you believe to be the top three greatest security threats (e.g., cookie/session poisoning, platform exploits, etc.), discuss the appropriate countermeasures that security personnel could utilize in order to minimize the damage of such threats. Determine whether or not the countermeasures that you have ranked are reactive or proactive in nature, and suggest the primary ways in which each countermeasure could assist in preventing further damage from the threats in question. Explain whether or not honeypots would assist in protecting and evaluating the three threats selected. Provide a rationale for your response.

· Any current topic or article related to penetration techniques.

· The instructor insight.

Reference no: EM131459697

Questions Cloud

Which regulation you would associate with that organization : Briefly describe the organization that you chose. which regulation you would associate with that organization. Explain purpose of regulation for that business.
Explain how marketers assess promotional effectiveness : Explain how marketers assess promotional effectiveness. The effectiveness of advertising can be measured by both pretesting and posttesting.
What are the goals of institutional advertising : What are the goals of institutional advertising? Institutional advertising promotes a concept, an idea, a philosophy, or the goodwill of an industry.
Identify the key components of the basic plan : Identify the key components of the basic plan and discuss how the local plan is connected to state and federal planning processes.
Analyze the potential security concerns : Analyze the potential security concerns, and identify what you believe to be the greatest concerns in terms of vulnerabilities. Explain your desired method(s).
Prepare a paper on unemployment : Prepare a Three to Five page paper on an economic topic of your choice in which you will address a question or topic - TOPIC OF UNEMPLOYMENT
How is sponsorship different from advertising : How is sponsorship different from advertising? Although sponsorship generates brand awareness, the sponsor has little control over the message.
What was discussed during the given seminar : Listen to the Seminar recording and write a 1-page summary of what was discussed during the Seminar.
Complete a balance sheet-profit and loss statement : Complete a balance sheet, profit and loss statement (statement of operations), and cash flow statement (statement of changes in net assets)

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd