Explain the immediate steps you would instruct your team

Assignment Help Management Information Sys
Reference no: EM132151156

Assignment : Malicious Activity

You are a manager of a Web development team for a fictional international delivery service. Please give your fictional business a name, and provide a sentence or two of background information about the company.

Your team maintains all of the e-commerce servers, including creating and updating all of the content on the Web pages and the database that stores customer information. These are mission critical servers.

You have 4 clustered nodes that are used for load balancing. These nodes are located in 4 cities around the globe. Two are in the USA, one is in Europe, and one is in Asia.

The choices of cities and countries is yours:

Node1: City___________Country___________

Node2: City___________Country___________

Node3: City___________Country___________

Node4: City___________Country___________

Each site is interconnected, and gets regular updates from the home office, located in a different city & country that you will choose.

A TCPDUMP is scheduled daily so the team can analyze real time traffic using WireShark. A team member alerts you to a potential problem found in <NODE OF YOUR CHOICE> capture.

There is an alarming amount of activities from port 40452, which shows a redirect to the index.php page instead of the login.php page. It appears this node has been compromised with a SQL Injection Attack. You rely on these sites so you are unable to shut down all e-commerce activities.

For this Assignment, please write a report to the new CEO. Describe your network as you have set it up. Describe your reasoning for the way you distributed the network. Then, in fully-developed explainations, address each of the following:

Explain the immediate steps you would instruct your team to use to contain the attack, but also to maintain the service to the e-commerce site.

Summarize the steps required to mitigate all future occurrences of this type of attack, including how to verify that the vulnerability has been rectified.

Evaluate the OWASP Top 10 2017, and list three more potential vulnerabilities. Provide specific mitigation strategies to address each risk.

Use at least four quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Note: Test the links to ensure they work before submitting your paper.

Format your assignment according to the following formatting requirements:

Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page is not included in the required page length.

Include a reference page. Citations and references must follow professional business language format. The reference page is not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Analyze Web traffic and log files for malicious activities

Analyze common Website attacks, weaknesses, and security best practices.

Use technology and information resources to research issues in securing Web-based applications.

Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions.

Reference no: EM132151156

Questions Cloud

Explain why long-term care services emerged : Why is it so important to present a board-level human resources report in June while the operating budget process is beginning?
What according to leblanc defines a metaphorical lesbian : What, according to LeBlanc, defines a "metaphorical lesbian"? In general (rather than in terms of her specific argument about The Awakening).
Social media or conventional media have on threat : What impact, if any, does social media or conventional media have on threat?
What other partnerships does the organization have : What other partnerships (companies, businesses, organizations, universities, etc.) does the organization have? What are the benefits of these partnerships?
Explain the immediate steps you would instruct your team : Explain the immediate steps you would instruct your team to use to contain the attack, but also to maintain the service to the e-commerce site.
Program with a function named randombetween : Need guidance on coming up with a C program with a function named randomBetween that returns a random floating point
Describe a specific assignment you worked : Describe a specific assignment, presentation, or project you worked on in one of your past courses at Grantham University that allowed you to develop.
Number of relevant documents : What is the number of relevant documents that are not retrieved by the system?
Translation of system commands : One of the issues in early virtualization use was slow performance due to translation of system commands.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd