Describe potential social engineering methods

Assignment Help Management Information Sys
Reference no: EM132275781

Assignment : Security Review Report

Consider the following:

Providing a secure information systems environment requires taking a proactive approach to security. One way to do this is by hiring external security consultants or auditors to evaluate the security of an organization's network.

Assume that you have been selected as the security consultant to perform a security review for an organization of your choice. The organization that you select for this assignment should have a public-facing website and, at minimum, one web application that can be used for this task.

You have been asked to review the website security of the organization of your choice and any web applications that are part of this site. Security risks such as SQL injection and social engineering should be considered.

For this assignment, you should begin with a footprinting analysis (security reconnaissance) of the selected organization. Gather as much background information on the organization and its website as you can.

Tasks:

Prepare an 8- to 10-page report on the following aspects:

Summarize the footprinting analysis of the company you selected.

Explain how the information gathered during your footprinting analysis could be utilized to initiate an attack against the organization.

Describe potential social engineering methods that could be used to acquire information about the organization's computing environment.

List at least 4-5 appropriate prevention techniques that can be used to thwart such social engineering techniques.

Enumerate a series of countermeasures that can be used to avoid this type of footprinting attack.

Identify a list of 10 web server vulnerabilities that the organization is most susceptible to.

Determine at least 10 threats against the organization's web applications that pose the greatest risk to the organization.

Describe how SQL injection could pose a potential security threat to the organization's web applications.

Your final deliverable will be 8-10 pages in length; utilize at least 3-5 scholarly sources in your research. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Reference no: EM132275781

Questions Cloud

Determine what makes each framework different from others : Create a Microsoft PowerPoint presentation that explains the major points of three different IT governance models.
Create better paying jobs but raise prices : If imposing a tariff on imports would create better paying jobs but raise prices, would you support it? Why?
Develop an executive summary of hospice care : Develop an executive summary of 3-4 pages, citing scholarly research, that details your understanding of hospice care and the benefits and risks of hospitals.
Private saving and canadian domestic investment : Suppose the Europeans suddenly become very interested in investing in Canada.
Describe potential social engineering methods : Describe potential social engineering methods that could be used to acquire information about the organization's computing environment.
Define the challenge and present two sides of the issue : Define the challenge, and present two sides of the issue. Support each stance with the most recent research on this particular topic.
Briefly explain about cooperative strategies : Briefly explain about cooperative strategies and explain why firms use them.
Write a report on solve a set of optimization problems : Assignment requires you to write a report on your attempts to solve a set of optimization problems as effectively as possible
What do you think would be the drivers for success : MITS4001 : Why is it important to strip away old ways of working when introducing systems such as those brought in by Liverpool Direct and Hyde?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why was her level of social identification different

What was Catherine's reaction after joining Fenway Waste Management, and why was her level of social identification different from that of LJI? Discuss the social identity issues present in this case with classmates.

  Research proposal on how to set up food truck selling

Research proposal on how to set up food truck selling Middle Eastern food in Indianapolis, Indiana. you will write a porposal research for that business.

  Examine how soa helps make reuse more economical

Discuss the most optimized sequence of services to deploy in an SOA roadmap, given metrics, revenue, and cost projections. Examine how SOA helps make reuse more economical.

  Program for restoration of medium criticality systems

Task of tasks for medium criticality systems. Program for restoration of medium criticality systems . Recovery measures necessary for low criticality system.

  How you applied the knowledge gained in your classes

How you applied the knowledge gained in your classes (Security Architecture and Design) and (Physical Security) this semester to your internship.

  Create a diagram showing the overall network

Create a diagram showing the overall network you've designed, from the user or endpoint device to the Internet cloud, and everything.

  Reflections on the progressive case study

The Briargrove Project has successfully completed multiple phases within the corporate offices.

  Beneficial to create a vulnrability map for a planned soft

Q1.  Summarize in your own words why it is beneficial to create a vulnrability map for a planned software system.  What the risks when you do not consider the inherent system vulnerabilities in planning ?

  How agile project management relates to project management

‘'How agile project management improves project management of information technology projects.''is viable for a research paper. What would you do after you have described agile methodology and how it improves management of information technology?

  Discuss the pros and cons of raising the minimum wage

Discuss the pros and cons of raising the Minimum Wage to double digits. You must conclude with which side you are on and defend your choice.To receive full credit you must satisfy the following criteria:1. Are there at least 3 pro and 3 con argument..

  Discuss how the development of informational resources

Discuss how the development of an informational resource, or your work in the discussion board, has helped you understand how to evaluate the credibility of online sources in an academic environment

  What advancements do you see in health care

What advancements do you see in Health care - Do you see the internet in the future of seeing the doctor instead of going to the office?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd