Determine whether the tool would be beneficial in testing

Assignment Help Software Engineering
Reference no: EM13854502

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal.

Project Deliverable

• Using the Case Study presented in this document, to complete an executive proposal.

• Provide a three to five page proposal summarizing purpose and benefit of chosen security software to the executive management team.

• The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats.

• The proposal should effectively describe the software in a manner that will allow the executiveteam members to understand the purpose and benefits of the software to approve purchase.

Project Description:

The purpose of project is to write an executive proposal for a fictitious company called Advanced Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits.

Suggested Approach

1. Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook.

2. Determine whether the tool would be beneficial in testing the security of a corporate network.

3. Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.

4. Include 3rd party endorsements and case studies about the tool.

5. Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab.

Reference no: EM13854502

Questions Cloud

What is the judeo-christian idea of god : What is the Judeo-Christian idea of God according to these texts? What are the characteristics or qualities of God according to Judaism and according to Christianity (as exemplified in these texts)
What if playground bullies exposed your darkest secrets : What If Playground Bullies Exposed Your Darkest Secrets
Accounting changes-error corrections : Molina Company's reported net incomes for 2015 and the previous two years are presented below.
Describe the latest important purchase you have made : Describe the latest important purchase you have made. What kind of information have you used to help you in your decision making process? Repeat the question for the latest trivial purchase you have just made.
Determine whether the tool would be beneficial in testing : Proposal summarizing purpose and benefit of chosen security software to the executive management team - Determine whether the tool would be beneficial in testing the security of a corporate network.
Amount of the capitalization of retained earnings : What is the amount of the capitalization of retained earnings for the stock dividend?
What is the relationship between vengeance and honor : Is Achilles' continued withdrawal from the army justified? Does his reaction to the violation of the heroic code give him heroic stature? What is the relationship between vengeance and honor that Achilles seems to pursue? Is this problematic at al..
Write a brief response on only the good die young : write a brief response on Violence is better than reason in dealing with dangerous situations.
Explain explain of a chronic disease surveillance system : When thinking about chronic diseases, how do you perceive the purpose and utility of passive surveillance as an epidemiological tool. Explain with an example of a chronic disease surveillance system. Would you advocate the reporting of select chro..

Reviews

Write a Review

Software Engineering Questions & Answers

  1 assume the role of a cfo of a mid-sized company that

1. assume the role of a cfo of a mid-sized company that exports to europe. your company received a contract to supply

  Develop erd by entities-attributes for driver-s log document

Use Microsoft Access to develop a preliminary (no keys and no relationships) database tables for Huffman Trucking Driver Log.

  Describe the use of arrays and subscripts

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

  Provide a rationale as to why add information

Promotion time is coming around the corner!In last board meeting, your supervisor has asked someone to create a list of tables for a Fernandos Skate Shop consumer orders.

  Question about hippa rights

I have found that to date, the largest offense is looking into family records even though workers are warned not too and that this is a violation of that family member's HIPAA's rights.

  Create the entity relationship diagram for hospital

Create the Entity Relationship Diagram(ERD) for following hospital scenario. For Patient entity illustrates its attributes. Highlight key attribute in red.

  The function of a misuse case methodology

Why is use case mapping so important to the function of a misuse case methodology?

  Designing flowchart for individual invoices from credit sale

Design document flowchart to depict this situation. Individual invoices from credit sales must be temporarily stored.

  Convert codes and symbols

Given a string of numbers, recognize all of the substrings that form numbers that are divisible by 3. For example, applying the algorithm on the string 37540 should produce following substrings.

  Path and editor variables in linux login

Login to Linux environment and construct start-up shell script. Whether you write the scripts as .profile or .cshrc, include the following options:

  What is the standard error

If you have five critical errors, two main faults, and five minor errors, what is the standard error

  Write a function playnovice

Write a function userPlay(marbles) that asks the user for the number of marbles that he or she would like to take and returns that number. The function should keep asking the user for the number of marbles if he or she takes more than half of the ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd