Analyze the potential security concerns

Assignment Help Management Information Sys
Reference no: EM131459697

Discussions

"A Consultant's Viewpoint and Relationships" Please respond to the following:

· Read and reflect upon the "Top Ten - Considerations for Evolving into the Role of a Consultant" in Chapter 5 of Roberts' text. Propose three actions that IT professionals should undertake in order to successfully achieve the Top Ten. Determine the single most paramount consideration, and justify your selection.

· As an IT professional who may face differing and competing priorities from business units, suggest one strategy for negotiating an achievable project scope without damaging the relationship with business units. Support your answer with the steps that you would take in order to implement your strategy.

· Suppose you work as a security analyst and during a weekly meeting your supervisor asks for your opinion about the ways in which the department could best identify vulnerabilities that a hacker could potentially exploit on a network. Analyze the potential security concerns, and identify what you believe to be the greatest concerns in terms of vulnerabilities. Describe the method(s) you would use to identify the related exploit(s). Explain your desired method(s) to perform this vulnerability analysis.

· Suggest the tool(s) that you would use to perform all or a portion of the analysis mentioned in Part 1 of this discussion. Justify the manner in which such tools could assist with these efforts.

· Any current topic or article related to penetration techniques.

· The instructor insight

· Review the attacks listed on the OWASP website, located at https://www.owasp.org/index.php/Category:Attack. Focus on selecting three attacks that you believe to be the greatest security threat, rank what you believe to be the top three greatest security threats (e.g., cookie/session poisoning, platform exploits, etc.), and provide a rationale for your rankings. Explain the key inherent dangers of the chosen threats, and indicate the key reasons why you believe such threats pose more of a risk than other current ones in existence. Justify your answer.

· Review the attacks listed on the OWASP website, located at https://www.owasp.org/index.php/Category:Attack. Focus on selecting three attacks that you believe to be the greatest security threat, rank what you believe to be the top three greatest security threats (e.g., cookie/session poisoning, platform exploits, etc.), discuss the appropriate countermeasures that security personnel could utilize in order to minimize the damage of such threats. Determine whether or not the countermeasures that you have ranked are reactive or proactive in nature, and suggest the primary ways in which each countermeasure could assist in preventing further damage from the threats in question. Explain whether or not honeypots would assist in protecting and evaluating the three threats selected. Provide a rationale for your response.

· Any current topic or article related to penetration techniques.

· The instructor insight.

Reference no: EM131459697

Questions Cloud

Which regulation you would associate with that organization : Briefly describe the organization that you chose. which regulation you would associate with that organization. Explain purpose of regulation for that business.
Explain how marketers assess promotional effectiveness : Explain how marketers assess promotional effectiveness. The effectiveness of advertising can be measured by both pretesting and posttesting.
What are the goals of institutional advertising : What are the goals of institutional advertising? Institutional advertising promotes a concept, an idea, a philosophy, or the goodwill of an industry.
Identify the key components of the basic plan : Identify the key components of the basic plan and discuss how the local plan is connected to state and federal planning processes.
Analyze the potential security concerns : Analyze the potential security concerns, and identify what you believe to be the greatest concerns in terms of vulnerabilities. Explain your desired method(s).
Prepare a paper on unemployment : Prepare a Three to Five page paper on an economic topic of your choice in which you will address a question or topic - TOPIC OF UNEMPLOYMENT
How is sponsorship different from advertising : How is sponsorship different from advertising? Although sponsorship generates brand awareness, the sponsor has little control over the message.
What was discussed during the given seminar : Listen to the Seminar recording and write a 1-page summary of what was discussed during the Seminar.
Complete a balance sheet-profit and loss statement : Complete a balance sheet, profit and loss statement (statement of operations), and cash flow statement (statement of changes in net assets)

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss about the chapter given below

Complete the "What Time Is It?" exercise in the chapter on pages 331-333. Chapter 15: Complete the "What Do I Owe Each Month?" exercise in the chapter on pages 334-340. Chapter 15: Complete the short exercise "But I Want to Do It a Different Way" ..

  Conduct a vulnerability

You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.

  Evaluate the level of system security

Based on your research, assess how corporate leaders may make improper assumptions related to accounting information systems and the related information. Indicate the most negative potential impacts on business operations related to these assumpti..

  Discuss each of the different components of an information

In this one- to two-page (250-500 word) paper, you will discuss each of the different components of an information system, and then explain how you can use the five-component model to guide your learning and thinking about information systems. You ma..

  Information networks and business intelligence decision

information networks and business intelligence decision locus and political hotbedis a good definition of business

  The security of corporate information

What impact do these have on the security of corporate information?  What steps does the corporation take to ensure its intellectual property is intact? What about client information?

  Describe how google uses information to make money

How Does Google Make Money? This video explains how Google uses information to make money. Google collects information from websites and adds it to its search engine.

  Write paper on virtual networking and vmware

Write a 20 page paper about Virtual Networking and VMware. what virtual networks are, what are its components, networking components, how is a Virtual Network different from a physical network

  Describe the scope and analyze how to control the scope

A business requirements document and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may cr..

  Explain about the project life cycle

The Project Life Cycle - Research and find an article related to the project life-cycle used in project management. Perform an online search, and locate an online article that is at least 2-3 pages.

  How viruses - adware and spyware would impact organization

Provide a review of the potential security issues related to the internal and external communications. Discuss how company communications policies can play an important role in the reduction of communication security risks. Include specifi..

  Questions on computer information system

Computer Information Systems and Management Metrics - Questions on Computer Information System. write a paper on, with defining MANAGEMENT METRICS

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd