Determining vulnerabilities for database server

Assignment Help Basic Computer Science
Reference no: EM133162490

Case Project 1. Determining Vulnerabilities for a Database Server

You have interviewed Ms. Erin Roye, an IT staff member, after conducting your initial security testing of the Alexander Rocco Corporation. She informs you that the company is running an older version of Oracle's database, Oracle 10g, for its personnel database. You decide to research whether Oracle 10g has any known vulnerabilities that you can include in your report to Ms. Roye. You don't know whether Ms. Roye has installed any patches or software fixes; you simply want to create a report with general information.

Question 1

a. Based on this information, write a memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g. (Hint: A search of the CVE Web site sponsored by US-CERT, https://cve.mitre.org/, can save you a lot of time.) If you do find vulnerabilities, your memo should include recommendations and be written in a way that doesn't generate fear or uncertainty but encourages prudent decision-making.

Case Project 2. Investigating Possible Vulnerabilities of Microsoft IIS 6.0

Carrell Jackson, the Web developer for Alexander Rocco Corporation, has informed you that Microsoft IIS 6.0 is used for the company's Web site. He's proud of the direction the Web site is taking and says it has more than 1000 hits per week. Customers can reserve hotel rooms, schedule tee times for golf courses, and make reservations at any of the facility's many restaurants. Customers can enter their credit card information and receive confirmations via e-mail.

Question 2

a. Based on this information, write a memo to Mr. Jackson listing any technical cybersecurity alerts or known vulnerabilities of IIS 6.0. If you find vulnerabilities, your memo should include recommendations and be written in a way that doesn't generate fear or uncertainty but encourages prudent decision-making.

Reference no: EM133162490

Questions Cloud

Types of intellectual property that should be protected : Describe the similarities and differences in the types of intellectual property (IP) that should be protected.
Honor code at sssas is important part of school life : The honor code at SSSAS is an important part of school life. Every year at the Upper School, students attend an Honor Code assembly which culminates
Workplace culture and technology : You think are important to managers working in today's world, characterized by generational differences, today's workplace culture, technology.
Radiology which are professional-technical and global : There are three guidelines for radiology which are professional, technical and global.
Determining vulnerabilities for database server : Based on this information, write a memo to Ms. Roye describing any CVEs or CAN documents you found related to Oracle 10g.
Example of technological fix of future : Give an example of technological fix of the future and explain your answer and how you would personally deal with such a situation.
Windows 10 allows users to customize desktop preferences : Consider a scenario where you manage more than 100 Windows 10 devices and are asked to provide input on allowing users to customize items such as the Start Menu
Definition of data mining that the author mentions : What is the definition of data mining that the author mentions? How is this different from our current understanding of data mining?
Radiology guidelines-professional-technical and global : Radiology guidelines fall under the following: professional, technical, and global

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Investigate the crime or the scene of the incident

1. Investigate the crime or the scene of the incident 2. Reconstruct the scene or incident

  Pseudocode that uses a loop to display

Write pseudocode that uses a loop to display all of the data from the following array. Your logic must work with a minor change to a constant

  What is the name of the text file on a windows

What is the name of the text file on a Windows computer that may store DNS to IP address mappings?

  Design static method below to find and return complex number

Given a "Complex" class with all the standard methods for complex numbers, design the static method below to find and return the smallest complex number.

  Possibilities curve between health and all other goods

Draw a production possibilities curve between health and all other goods

  Show the ieee 754 bit pattern

Show the IEEE 754 bit pattern for the subsequent numbers (assume excess 127):

  Victims of information disclosure and privacy threats

Perform a internet search for three or four companies that have been victims of Information Disclosure and privacy threats.

  Cyber terrorism is considered terrorism activity

Cyber terrorism is considered as terrorism activity in which attackers attack on the properties and affect computer, information by taking support of internet

  What nominal rate of return did you earn on investment

If the inflation rate for the past year was 2.0%, what nominal rate of return did you earn on this investment?

  When china reformed state-owned enterprises

When China reformed state-owned enterprises, it tried a new approach to choosing managers: it put managerial jobs up for auction.

  Theories of hr management and blockchain

How the knowledge, skills, or theories of the HR management and Blockchain have been applied, or could be applied,

  The labor movement in a global economy

The topics covered throughout the course will provide a starting point for further research. The final assignment must be supported by a solid foundation in labor relations concepts taken from the textbook as well as outside research. The research..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd