Design and critically appraise computer programs

Assignment Help Computer Networking
Reference no: EM133171428

Vulnerability Audit and Assessment - Analysis and Plan

Learning Outcome 1: Identify and analyse security threats and vulnerabilities in network systems and determine appropriate methodologies, tools and techniques to manage and/or solve them.

Learning Outcome 2: Design and critically appraise computer programs and systems to produce solutions that help manage and audit risk and security issues.

Assignment Topic

You have been tasked by an organisation to evaluate their website (provided in Unit 1) and produce an analysis document. It should consist of:
• Details of possible security vulnerabilities.
• A list of standards appropriate to their business and any non-compliance against those standards.
• A summary of recommendations and potential mitigations that could be used to ameliorate any risks. These should be ordered by importance.
Your main conclusions will be presented in an executive summary, due at the end of Unit 6.
For this this first assessment, you will need to produce an analysis document that promotes the benefit of what you will be doing for the business and sets a baseline for the subsequent scans to be evaluated against.
Your analysis document to your client should cover the following requirements.

Assignment Breakdown
The assignment breakdown is highlighted below, to be reviewed alongside the grading criteria in Module Resources.
Knowledge and Understanding, weighted at 25%:
• A baseline assessment of the website, based on academic research.
• A list of potential security challenges based on research/review.
Application of Knowledge, weighted at 25%:
• A list of the tools you will use, justifications for why you selected the tools.
• A list of any (potential) impacts on normal operations caused by using the tools.
• A list of assumptions and limitations of the tools and outputs produced.
• A timeline for the completion of the assessment tests and evaluation.
Presentation and Structure of your work, weighted at 25%:
• Includes spelling, style, evidence of proofreading, correct use (and format) of citations and references.
It is recommended you use tables and bullet-point lists to stay within the word count.

Please note: appendices should not be used to extend the core report as reports should stand alone, complete and concise, without the appendices. They should only be used if required, and only for supplementary and/ or supporting information. One key part of the exercises in this module is the need to be to be able to express ideas succinctly, concisely and with necessary brevity.

Attachment:- Vulnerability Audit and Assessment.rar

Reference no: EM133171428

Questions Cloud

Calculate the sensitivity of project npv : Calculate the sensitivity of project NPV to changes in the price of the new clubs and the quantify of the new clubs sold
Describe four advantages provided by a dbms : 1. A DBMS helps make data management more efficient and effective. List and describe four advantages provided by a DBMS
How much must you give today : You decide to make a gift to the Harbert College of Business. How much must you give today if the appropriate discount rate is 12 percent
Describe a comprehensive dashboard for the ceo : Describe a comprehensive dashboard for the CEO of the company. What data would be on this dashboard?
Design and critically appraise computer programs : Design and critically appraise computer programs and systems to produce solutions that help manage and audit risk and security issues
Calculate allocation ratios for power and general factory : Stevenson Company is divided into two operating divisions: Battery and Small Motors. Calculate the allocation ratios for Power and General Factory
Negligence claim or intentional tort : Discuss whether lack of informed consent for a medical procedure should be a negligence claim or an intentional tort.
Compliance implications of billing specialist actions : Identify the legal and compliance implications of the billing specialist's actions. Describe how you believe the manager and hospital should respond to issue.
How long must she live after the day she retired : How long must she live after the day she retired to come out ahead (that is, to get more in value than what she paid in)? She must live at least years

Reviews

Write a Review

Computer Networking Questions & Answers

  Improve network security and provide control

You have implemented a firewall within your network to improve network security and provide control of your data flow.

  What are the three main types of network media

Question 1: What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways? Question 2: What are the three main types of network media?

  Use short answers to explain the difference including the

1.what are some of the reasons an organization might consider using a wireless lan?2.what type of security issues need

  Take four screenshots to show the results of call testing.

Testing phone calls between extensions before the interexchange trunk configuration, Take four screenshots to show the results of call testing

  Which modern wireless technologies use ofdm

Investigate the history of the CSIRO Wifi patent which was recently up-held in courts in the United States.

  Sources must be cited in apa format nbspyour response

sources must be cited in apa format. nbspyour response should be a minimum of one 1 single-spaced page to a maximum of

  List the network protocols that you plan to use in network

List the network protocols that you plan to use in the network. The list should indicate where each protocol will be used.

  What special function does a cache server perform

How does screened-host firewall architecture differ from screened-subnet firewall architecture? Which offers more security for the information assets that remain on the trusted network?

  Intercepting the message in conversation

Provided that Alice and Bob both suppose that they have the correct public keys for the other party, and supposing that Eve may intercept any messages passed between Alice and Bob, Describe the steps Alice could take in order to ensure that the pub..

  Part a a number of the technological developments in

part a a number of the technological developments in manufacturing are now in use in services. an example of this is

  CNCO3002 Advanced Computer Communications Assignment

CNCO3002 Advanced Computer Communications Assignment Help and Solution, Curtin University, Australia, Assignment - My Proxy Server

  Increasing lan efficiency using a backup domain controller

dentify required configurations for your chosen scenario, and perform the configurations using either virtually or physically installed OS to realise scenario

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd