Medium-sized software development

Assignment Help Business Management
Reference no: EM131296034

Suppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company. The Software Development Director has asked you to provide a detailed presentation for her department regarding the most common Web application threats and the manner in which their products could compromise customer financial data. The products in question use Microsoft SQL Server databases and IIS Web servers. She has asked you to provide a report for her review before she schedules the presentation.

Write a two to four (2-4) page paper in which you:

  1. Analyze the common threats to data systems such as Web applications and data servers. Next, speculate on the greatest area of vulnerability and potential for damage and / or data loss of such data systems (e.g., SQL injection, Web-based password cracking).
  2. Devise one (1) attack scenario where a hacker could use the area of vulnerability that you chose in Question 1 in order to gain access to a network or sensitive data. Examine the primary ways in which the hacker could execute such an attack, and suggest the strategic manner in which a security professional could prevent the attack.
  3. Explore the primary role that the human element could play in adding to the attack scenario devised in Question 2. Give your opinion on whether or not the human component is critical in protection from that type of attack.
  4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe security concerns, tools, and techniques associated with Web servers and Web applications.
  • Identify the means of hacking Web browsers. 
  • Summarize the manner in which database servers and applications are compromised and examine the steps that can be taken to mitigate such risks (e.g., SQL injection).
  • Use technology and information resources to research issues in ethical hacking.
  • Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131296034

Questions Cloud

Does the decision made affect an individual or a community : Is this short term or long term? Is this a short term or long term issue? Is this case of dispensing justice or dispensing mercy? Does the decision made affect an individual or a community?
Create three charts like the examples on the cell formatting : Create a table, like the one on the Cell Formatting sheet but with different items, with 3 rows and 3 columns. Put your table in cells A26 through D29. Create three charts, like the examples on the Cell Formatting sheet. Be carefu..
Write essay indicate what you know about behavioral finance : Please write a 2 pages reaction essay indicating what you have learnt, what surprised you and what else you would like to know about behavioral finance. The reaction essay will be based on the pdf and a youtube video.
Cultural change and project sponsorship : Examine the primary reasons why project management causes a cultural change and the impact of that change on integrative information technology. Support your response with at least one (1) example of a cultural change that project management can c..
Medium-sized software development : Suppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company.
What is a security policy : 1)  What is a security policy? what are the typical elements of a policy? 2) what are security controls and how do they relate to security architecture. Give a specific example.
Discuss how a companys culture can affect its quality : The CEO of your firm has heard from several of his peers in town that major new quality initiatives almost always require some kind of culture change.Discuss how a company's culture can affect its quality performance from both a positive and negati..
Database in the left pane : After opening SQL Server, go to the AdventureWorks database in the left pane, expand the database, right click on database diagrams, click new database diagrams, and explore the ERD for AdventureWorks until you can identify the six tables necessar..
Discuss how the research might help solve the problem : Discuss how the research might help solve the problem. Describe the business research process followed in the study. Identify the research problem, the research design approach, and research method used.

Reviews

Write a Review

Business Management Questions & Answers

  Nash-bertrand equilibrium price

If firms produce identical products and have the same constant marginal cost, m, explain why the Nash-Bertrand equilibrium price and market quantity are the same regardless of whether there are two or more firms.

  Risk premium associated with stock

What is the stock price today if the risk free rate is 4 percent and the risk premium associated with this stock is 6 percent?

  Determine size of marketing budget in business unit

How do you determine the size of the marketing budget in your business unit? Are there other/better ways?- Which models and approaches do you use?

  Calculate and graph the marginal cost of serving

Calculate and graph the marginal cost of each serving. Show your calculations! Why does the MC curve have the slope (up, down, or flat) that it does?

  Conduct a service firm audit for the commonwealth bank

This assessment requires students to adopt the position of marketing consultants and conduct a service firm audit for the Commonwealth Bank of Australia Students are to apply Marketing and Services Marketing theory as well as concepts learnt in cl..

  Address the statement

Which universal standard could be used to address the statement "Most men are under 200 lbs?"

  Strategy of related diversification unrelated diversificatio

Based on the above list deliberate whether or not Walt Disney's line-up reflects a strategy of related diversification unrelated diversification or a combination of related as well as unrelated

  Do you consider yourself handicapped in any way

Do you consider yourself handicapped in any way? Is there a history of chronic illness in your family? Are you planning to start a family soon? How does your military experience relate to this job?

  Large food-processing plant

Sam is one of many potato growers who sell potatoes to a large food-processing plant. It is safe to assume that potatoes are sold in perfectly competitive markets.

  The influence of religion on international business

The Influence of Religion on International Business

  Explain the appropriate process capability index

The standard deviation of the amounts was 0.034 ounce. Determine the appropriate process capability index. Roughly what proportion of bottles meet the specifications?

  Government assistance and influence

Show how governments influence and effect national competitiveness and this Conference should also discuss the resent government Bailout of the banking and automotive industries

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd