Conduct a vulnerability, threat, and security assessment

Assignment Help Computer Network Security
Reference no: EM133215545 , Length: Word Count: 8 Pages

Assignment - Vulnerability Threat & Security on TikTok Research Paper

Description - You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.

Pick a site that hosts a social networking functionality other than Facebook. Do not choose Facebook.

State the site homepage link, and a short description of the site.

Create a clear description of the ideal visitor to this site by considering the details of these demographic elements:

1. Age range

2. Relationship status

3. Geographical location

4. Employment status

5. Type of employment

6. Income range

7. Hobbies

8. Shopping habits

9. Surfing habits

10. Gender

Conduct a vulnerability assessment of the site by observation only then answer these questions:

What are some apparent vulnerabilities?

What threats are possible on this site?

What attacks are possible?

What would be exposed in case there were to be an attack?

Write an 8-page paper introducing the site, and your findings from the above exercise, and finalizing by giving a clear recommendation for the organization that owns and/or hosts the site?

Submission Instructions: Be sure your paper ALL of the above requirements, and the following formatting requirements: 8 pages (double-spaced), excluding the title page, the abstract page (if included), and the references pages.

Use at least 3 references outside of your textbook (you may use your textbook too, but are not required to).

In addition to the required number of pages for the assignment, you must also Include title page, a reference page (bibliography), written in APA style, and a title page.

Reference no: EM133215545

Questions Cloud

Make a high-level report on current system : As a workplace activity (or simulated workplace activity), gather documentation and research the applicable WHS legislation in NSW, regulations, standards and c
Organisation operates within economic rationalism discourse : What does it mean if an organisation operates within an economic rationalism discourse?
Management style cons and overall evaluation and summary : Introduction, Biography, Management Functions, Management Style Pros, Management Style Cons and Overall Evaluation and Summary
Turning around cote construction company : When Liam Cote decided to help his cousin Felix Cote turn around his business, he had no idea that things were as bad as they were. Liam knew that the bank's lo
Conduct a vulnerability, threat, and security assessment : You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation
Design thinking and innovation at apple : These questions are intended to help students focus on the key elements as they read the case.
What are the three pillars of authentic leadership : Read the article: AUTHENTIC LEADERSHIP: THE KEY TO BUILDING TRUST Answer the following questions based on the article and the study materials provided.
Explain the effect of information systems : Briefly explain the effect of Information Systems on business management and the importance of systems like CRMs, ERPs, and more
Describe google vision and mission statement : Assume that for now you are an HR Consultant and Google requires you to develop a human resources strategic plan, commencing with a draft of the proposed plan.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd