Explain the current state of web application security

Assignment Help Computer Network Security
Reference no: EM131467910 , Length: 5

Assignment : Outline a New IT Security Policy

You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards. RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website.

However, RollinOn has had some internal security issues. RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet. The Web application development team has increased in size and is also in need of sound security practices. There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.

Your main objective is to create an outline of a new IT security policy regarding the company's web presence and lack of access control. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Part I: Written Section

Write a three to five (3-5) page paper in which you:

Briefly explain the current state of Web application security to the Board of Directors.

Describe the major potential security risks associated with maintaining the organization's Web presence, protecting its assets, and promoting e-Commerce.

Assess any techniques and technologies that you may need to use to mitigate those potential security risks.

Create an outline of your new IT security policies for RollinOn. Be sure to relate your policies to the potential risks.

Speculate on the most common types of resistance that you might encounter from employees when implementing your new IT policy.

Use at least four (4) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.

Format your assignment according to the following formatting requirements:

Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Part II: PowerPoint Presentation

Create an eight to ten (8-10) slide PowerPoint presentation for the Board of Directors in which you:

8, Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks.

The specific course learning outcomes associated with this assignment are:

Analyze the impact of the Internet and Web applications on the business world.

Analyze the evolution of social media, social networking, and the ethical issues they raise.

Compare and contrast Web-based risks.

Analyze common Website attacks, weaknesses, and security best practices.

Reference no: EM131467910

Questions Cloud

Identify any complementary therapies : Identify any complementary therapies that might be appropriate or used with conventional treatment.
Common sexually transmitted diseases : Compare 5 of the most common sexually transmitted diseases (STDs). Include causative agent, signs and symptoms and treatment.
Discuss what sample size would provide sufficient data : Describe the advantages and disadvantages of using a web-based survey (or other measures) for data gathering.
Find the longest increasing subsequence of a given sequence : Find the longest increasing subsequence of a given sequence / array. In other words, find a subsequence of array in which the subsequence's elements.
Explain the current state of web application security : Describe the major potential security risks associated with maintaining the organization's Web presence, protecting its assets, and promoting e-Commerce.
Generate options for solving the problem in the scenario : Define the problem in the scenario that you have chosen.Analyze the problem in the scenario.
Transported on the same plate : In relation to cross contamination, should cooked burgers be transported on the same plate from when they were raw? Explain.
Define the function prototype : Implement wildcard pattern matching with support for '?' and '*'. '?' : Matches any single character. '*' : Matches any sequence of characters.
Model of drug addiction : Explain "Major drug that acts as a receptor agonist and best known model of drug addiction, the opiate drugs.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Why do you think functional silos are not appropriate for

1. where are erp systems heading in the future? do you agree or disagree with the trends discussed in the chapter?

  Design the layout of users

The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

  Denote the des encryption of the plain text

Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.

  Paper on entropy as it pertains to cryptography

Turn in a 3 page paper on Entropy as it pertains to Cryptography. The paper must discuss the relationship of Entropy to the likelihood that an attack can be successful, the formula for computing Entropy

  Analyze how coppa and cipa are similar and different

Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two different acts. Describe what you believe are the most challenging elements of both COPPA and CIPA to implement in order to be compliant.

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  The network administrator to protect the network against

over the past several years the chief executive officer of your company has read articles on internet control message

  Description of des encryption feistel structure algorithm

Prove that y’ = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented). [This is Question 3.3 of the textbook. Hint: this can be proved using the “high-level” description of DES encryption Feistel structure ..

  Determine primary security risk that users must acknowledge

Based on the article by Lenning (2005), determine a primary security risk that users must acknowledge when using macros? Why is it significant to educate users of these risks once their dilemma is resolved?

  Problem related to internet communication

Question 1: What is Net Neutrality and why is it important? Question 2: From the group project, identify at least one important step needed to work successfully with a team when working virtually (collaborating online rather than face to face). Th..

  Discuss some of the problems nats create for ipsec security.

Why deployment of IPv6 has been slow to date

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd