How will the software impact the production environment

Assignment Help Basic Computer Science
Reference no: EM13925304

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present aproposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal.

Project Deliverable

Using the Case Study presented in this document, to complete an executive proposal.

Provide a three to five page proposal summarizing purpose and benefit of chosen security software to the executive management team.

The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks anddeter any real-time unknown threats.

The proposal should effectively describe the software in a manner that will allow the executive team members to understand thepurpose and benefits of the software to approve purchase.

Guidelines

Evaluate and select a security tool for recommendation that you learned about in the iLabs modules or the EC-Council text books.

The proposal document must be 3 to 5 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects.

At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References."

Appropriate citations are required. See the syllabus regarding plagiarism policies.

This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity.

The paper is due during Week 7 of this course.

Project Description

The purpose of project is to write an executive proposal for a fictitious company called Advanced Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must includea detailed description of the software, its purpose and benefits.

Suggested Approach

Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook.

Determine whether the tool would be beneficial in testing the security of a corporate network.

Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.

Include 3rd party endorsements and case studies about the tool.

Integrate the information from your own experience with the tool into your proposal. This may include results from the iLabexercises or your own test lab.

Company Description
Advanced Research Corporation

Advanced Research is a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Advanced Research is on its way to becoming a major player in the medical research and development industry. However, due to its success, Advanced Research has also become a major target of cybercriminals. Advanced Research has been the victim of cybercriminal attempts to steal intellectual property and sell it toAdvanced Research's competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2011, Advanced Research was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Advanced Research's public website and several Denial of Service attacks at different times over a 9 month period that brought the corporate network to its knees. These attacks had a major impact on Advanced Research's ability to conduct business and resulted in undesirable publicity for the company.

Regardless of its security problems, Advanced Research has continued to grow as a company. Its research and development departments have grown over the years, due to the expansion of the company, in proportion to the increase in its business makingup over 40% of the human resources. Advanced Research's innovative research and development information is paramount to its continued success as a company. Although, no known attacks have occurred in last 18 months, the security of its network and intellectual property is still a major concern for the company. Because Advanced Research is a still fairly young company, management has been hesitant to budget for expensive security projects. However, this point of view is beginning to change. Particularly, because one of Advanced Research's competitors, a major player in the medical research and development industry for over 40 years, experienced a loss of hundreds of millions of dollars in research data that was stolen from its corporate network by cyber thieves.
Background and your role

You are the IT Manager hired in 2012 to manage the physical and operational security of Advanced Research's corporate information system.

You understand information security issues better than anyone else in the company. You also know that the network is vulnerable to outside threats because it has experienced attacks in the past and because you haven't had the resources to properly test the corporate information system to identify the vulnerabilities that might exist and take action prevent possible attacks. You have a responsibility to bring these concerns to the attention of the executive team and ask for approval to purchase the necessarytesting software.

Your education and training have introduced you to variety of security tools for testing computer and network security. The majorityof these tools you either only read about or have practiced using in lab environment. You have decided to research some of these tools and test them out in your own lab environment and choose one for recommendation to executive team.

You will need to present information that proves the chosen tool will be beneficial to the security of corporate information system. To accomplish this you will need to research the product, if possible, test the product in a virtual lab environment. If the tool is part of your iLab exercise, it is recommended that you practice using and testing the tool beyond the scope of the lab exercise. Based on your research and analysis, you will include this information in your proposal in way that the executive staff can understand andallowing them to make an informed decision to approve purchase of the product.

The executive management team of Advanced Research:

The proposal should include:

Detailed description of the software and benefits.

Include reviews, case studies and customer recommendations

Include your own hands-on experience with the tool and test results

Cost of product. Include additional costs such as training or hardware software that might be needed in order to properly deploy manage and maintain the software.

How will the software impact the production environment? For example, the software may test for Denial of Service attacks. You need to explain any interruptions the test may have on business operations. You need to justify the need for such a test. Also explainhow to you plan to minimize or prevent possible production outages.

The software should test for one or more of the following types of attacks:

Denial of Service (DoS)
Cross Site Scripting (XSS)
Authentication Bypass
Directory Traversal
Session Management
SQL injection
Database Attacks
Password Attacks
Firewall/Router Attacks
Operating System Attacks
Corporate Office Network Topology

The Advanced Research main research and development facility is located in Reston Virginia. You have concerns about the sensitive information that is stored at this location as well as data that transmitted over the WAN to Advanced Research's New York City headquarters location, business partners and clients. The Reston facility is also where the Advanced Research data center is located. The data center is where Advanced Research's public website, email, databases and corporate intranet are hosted. The environment contains a mix of Microsoft and *NIX technologies.

45 Windows 2008 Servers
13 Windows 2003 Servers
15 UNIX Servers
2200 Windows XP and 7 Desktops

Web Servers: Apache and IIS
Services: FTP, SMTP, DNS, DHCP, VPN
Database: SQL, Oracle and MySQL
Network: Cisco Routers and Firewalls

Grading Rubrics

Final Deliverable

Category

Points

%

Description

Documentation and Formatting

10

10%

Appropriate APA citations/referenced sources and formats of characters/content.

Software Research

20

20%

Accurate Completion of Software Research

Software Analysis

20

20%

Accurate Completion of Software Analysis

Executive Proposal

50

50%

Provide proposal for purchase

Total

100

100%

A quality paper will meet or exceed all of the above requirements.

Reference no: EM13925304

Questions Cloud

Identify six guidelines for drafting effective website conte : Identify six guidelines for drafting effective website content, and offer guidelines for becoming a valuable wiki contributor.Drafting Website ContentMajor sections on websites, particularly those that are fairly static (unlike, say, a blog) function..
Mutually exclusive projects and contingent projects : Raider Productions has to decide whether to build its warehouse in Dallas or Houston. This decision falls into the class of a. independent projects. b. mutually exclusive projects. c. contingent projects. d. marginal projects.
Conduct an analysis of the industry and competitors : What are the best tools to use in this situation and provide a brief summary of at least 2 of these tools and why do you think these are the best ways to analyze the market?
Auditing database systems and storage systems : 1. In Module 5, we learned what to look for when auditing database systems and storage systems. In general, lets consider both of these as information systems (databases store information and so do storage systems). In this activity you will have ..
How will the software impact the production environment : Evaluate and select a security tool for recommendation that you learned about in the iLabs modules or the EC-Council text books.
What can you say about joes performance : Performance analysis shows that he has realized an information ratio of 1 and a t statistic of 1 over this period. What can you say about Joe's performance?
How the blood pressure can be measured : What does a blood pressure measurement of 110/70 mean?
Cash dividend declaration : cash dividend declaration and payment of $1 per share 3) property dividend declaration and payment of shares representing a short-term
Executed mortgage of blackacre to secure : Marcia executed a mortgage of Blackacre to secure her indebtedness to Ajax Savings and Loan Association in the amount of $125,000. Later, Marcia sold Blackacre to Morton. The deed contained the following provision: “This deed is subject to the mortga..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Benefits associated with technological convergence

Identify additional concerns that you believe might have some social and ethical implications as a result of converging technologies and describe these implications and justify your choices. Include relevant information--facts and/or opinions--fr..

  Create your own function that accepts one input parameter

Using Pseudocode, create your own function that accepts one input parameter and returns a float number. You decide the theme.

  Create a lookup table for the plan codes and prices

The sheet "Customers" contains data from City Health Club. Customers are listed by a customer ID with the plan they signed up for and the date that they paid for the period starting on July 1st. You are given a spreadsheet with the data using a co..

  Invoke method to tell the air conditioner object to turn on

Using the reference variable, invoke a method to tell the air conditioner object to turn on.

  Significant invention which shaped society today

Pondering history of technology development, decide what you think was the most significant invention previous to the 1600s which has shaped society today. Explain your decision.

  Elway business services

You have been asked by Elway Business Services Inc. to evaluate the possible financial loss that could be accrued by threats to its servers. You decide to use the ALE equation to estimate this cost. As a starting point, EBS provides the follow..

  Proposals coming from contractors who have unique skills

Proposals coming from contractors who have unique skills in providing goods and services are called:    a. best and final offers (BAFOs)    b. negotiated proposals

  Write a scholarly paper at an appropriate standard

What object (people, places or things) does it suggest you need to study and what kind of study does the question suggest (empirical--e.g., ethnography, case study, descriptive study, experimental; historical--oral or archival or both; theoretical;..

  Pipeline diagram for processor which has no forwarding

If the processor has no forwarding, how many cycles will one loop iteration take? show a pipeline diagram to support your answer.

  Explain how decision problem is decidable

Think of the way to mark all variables A such that for some string x ∈ Σ*, A (⇒*(over)G) x. Describe algorithm in detail.

  Identify the elements of the business model

Identify the elements of the Business Model that cloud computing as a new opportunity could transform and describe the Business Concept, that outlines the vision of this future business model,

  Analyze the overall attributes of symmetric and asymmetric

"Cryptography"  Please respond to the following: Analyze the overall attributes of symmetric and asymmetric cryptography technologies. Discuss the advantages and disadvantages of each, and speculate upon the main reasons why organizations utilize bot..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd