Design and critically appraise computer programs

Assignment Help Computer Networking
Reference no: EM133171428

Vulnerability Audit and Assessment - Analysis and Plan

Learning Outcome 1: Identify and analyse security threats and vulnerabilities in network systems and determine appropriate methodologies, tools and techniques to manage and/or solve them.

Learning Outcome 2: Design and critically appraise computer programs and systems to produce solutions that help manage and audit risk and security issues.

Assignment Topic

You have been tasked by an organisation to evaluate their website (provided in Unit 1) and produce an analysis document. It should consist of:
• Details of possible security vulnerabilities.
• A list of standards appropriate to their business and any non-compliance against those standards.
• A summary of recommendations and potential mitigations that could be used to ameliorate any risks. These should be ordered by importance.
Your main conclusions will be presented in an executive summary, due at the end of Unit 6.
For this this first assessment, you will need to produce an analysis document that promotes the benefit of what you will be doing for the business and sets a baseline for the subsequent scans to be evaluated against.
Your analysis document to your client should cover the following requirements.

Assignment Breakdown
The assignment breakdown is highlighted below, to be reviewed alongside the grading criteria in Module Resources.
Knowledge and Understanding, weighted at 25%:
• A baseline assessment of the website, based on academic research.
• A list of potential security challenges based on research/review.
Application of Knowledge, weighted at 25%:
• A list of the tools you will use, justifications for why you selected the tools.
• A list of any (potential) impacts on normal operations caused by using the tools.
• A list of assumptions and limitations of the tools and outputs produced.
• A timeline for the completion of the assessment tests and evaluation.
Presentation and Structure of your work, weighted at 25%:
• Includes spelling, style, evidence of proofreading, correct use (and format) of citations and references.
It is recommended you use tables and bullet-point lists to stay within the word count.

Please note: appendices should not be used to extend the core report as reports should stand alone, complete and concise, without the appendices. They should only be used if required, and only for supplementary and/ or supporting information. One key part of the exercises in this module is the need to be to be able to express ideas succinctly, concisely and with necessary brevity.

Attachment:- Vulnerability Audit and Assessment.rar

Reference no: EM133171428

Questions Cloud

Calculate the sensitivity of project npv : Calculate the sensitivity of project NPV to changes in the price of the new clubs and the quantify of the new clubs sold
Describe four advantages provided by a dbms : 1. A DBMS helps make data management more efficient and effective. List and describe four advantages provided by a DBMS
How much must you give today : You decide to make a gift to the Harbert College of Business. How much must you give today if the appropriate discount rate is 12 percent
Describe a comprehensive dashboard for the ceo : Describe a comprehensive dashboard for the CEO of the company. What data would be on this dashboard?
Design and critically appraise computer programs : Design and critically appraise computer programs and systems to produce solutions that help manage and audit risk and security issues
Calculate allocation ratios for power and general factory : Stevenson Company is divided into two operating divisions: Battery and Small Motors. Calculate the allocation ratios for Power and General Factory
Negligence claim or intentional tort : Discuss whether lack of informed consent for a medical procedure should be a negligence claim or an intentional tort.
Compliance implications of billing specialist actions : Identify the legal and compliance implications of the billing specialist's actions. Describe how you believe the manager and hospital should respond to issue.
How long must she live after the day she retired : How long must she live after the day she retired to come out ahead (that is, to get more in value than what she paid in)? She must live at least years

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd