Prepare an executive summary report for presentation

Assignment Help JAVA Programming
Reference no: EM13942471

Scenario:

UNFO traditionally has been a brick-and-mortar retailer, and the management has experienced associated business risks such as employee theft and shoplifting. However, as the organization moves into the e-commerce model, new risks will be introduced to the organization. As the information security analyst, it will be your role to summarize the business impact of these new risks, the motivating factors behind exploiting vulnerabilities, and how the risks can be mitigated.

Tasks:

Prepare an executive summary report for presentation to the senior management to assist the team in understanding IT security risks associated with an e-commerce model. Additionally, the senior management team will need to use the report as guidance for determining a budget allocation for hiring new IT professionals who will implement the e-business model and design the web applications using the Software Development Life Cycle (SDLC). Also discuss how this team can make this process secure and thus greatly reduce the risk of having exploitable web applications. Your report should cover the following points.

Through the given scenario of UNFO, identify the weaknesses and vulnerabilities associated with creating web applications for the proposed Web platform using the SDLC process. To do so, you must:

1. Research and classify common weaknesses and attacks associated with e-commerce and social networking applications.

2. Identify the motivation for potential attacks and summarize the importance of identifying them early in the development or implementation process.

3. Identify the roles such as System administrator, developer, security engineer, and quality assurance analyst for each classification.

4. Explain the business impacts of a successful exploit on a Web application's weakness.

5. Identify resources to create secure coding policy and guidelines.

6. Explain how to introduce security into the SDLC.

7. Recommend revisions to the control process.

8. Identify the techniques or processes for software developers to review their source code.

Executive Summary
Carrie Smith
UNFO Information Security Analyst
Introduction:
Identify the Current UNFO Situation based on the Scenario. Describe the purpose of the paper and its goal to inform Senior management.
Risks:
Identify weaknesses of the e-commerce environment as it pertains to UNFO.
Describe common attacks associated with the e-commerce and network applications that UNFO will use for their business.
Motivation for Attacks:
Describe why hackers would attack UNFO.
Explain why some unscrupulous companies would attack UNFO.
Personnel Roles:
System Administrator:
Developer:
Security Engineer:
Quality Assurance Analyst:
Business Impact on UNFO if Attack Successful:
Summarize the impacts in this section.
Software Security Team:
Identify Members.
Describe mission of the team as it pertains to UNFO.
Control Processes for the SLDC:
List the stages of the SLDC and the Security requirements for each process. Summarize-do not copy from the book.
Explain UNFO's role in this process.
Reviewing Source Code:
Input Validation:
Encryption:
Data Security:
Authentication Procedures:
Error Handling:
Summary:
Summarize all thoughts above as it pertains to UNFO.

Reference no: EM13942471

Questions Cloud

Possible interpretations of each non-verbal behavior : Discuss three possible interpretations of each non-verbal behavior and analyze how each interpretation would influence the speaker's evaluation of audience feedback/change
Selected data for stick''s design : The following information is given for Tripp Company, which uses the indirect method.Net income $20,000
What would happen if a law passed dictating : What would happen if a law passed dictating that kindergarten teachers could make no less than $100,000 per year?
Describe three issues facts related to children learning : Describe three issues/facts related to children's learning in read and writing that you have learned after reading the article, "Learning to Read and Write: Developmentally Appropriate Practices for Young Children" by NAEYC.
Prepare an executive summary report for presentation : Identify the motivation for potential attacks and summarize the importance of identifying them early in the development or implementation process
Who should be held liable if the resident sustains injuries : Take a position as to whether or not nursing homes should have the authority to restrain a resident. Next, determine who should be held liable if the resident sustains injuries while being restrained. Provide a rationale for your response
Described whether the plan implements the ics process : Assessed and described whether the plan implements the ICS process. If not, explained how people would incorporate the process into a city if it were facing a natural disaster.
Calculate and tabulate dc-fe for carbon compositions : Beginning with Fick's law and the assumption of a constant diffusion coefficient, DC-Fe, show that dpC /d (lnr) is a constant. Sketch the carbon mass density, pC(r), as a function of lnr for such a diffusion process.
Reading or story telling activities : How can children's social, language, and cognitive developments be promoted through reading or story telling activities?

Reviews

Write a Review

JAVA Programming Questions & Answers

  Implement/update specific methods for the dfs of a graph

show the DFS order of vertices in the graph, and for each node, specify its parent node in the search (the node from which the currect node was reached). Moreover, display for each node the discovery and finishing time, to check that the Parenthesis ..

  Part iyou have to write a computer program that will figure

part iyou have to write a computer program that will figure out the total of an order when given the amount of the

  What ways can vulnerable inmates be protected

What ways can vulnerable inmates be protected? Why are classification and housing assignments so critical to these populations?

  Mean and standard deviation write a program that reads a

mean and standard deviation. write a program that reads a set of floating-point data values from the input. when the

  Write methods in java

1. int countVowels (String s) That for a given string s, return number of vowels in s.

  1 what makes a program easy to modify2 describe the order

1. what makes a program easy to modify?2. describe the order of magnitude of the following code section using bigo

  Problem 1write a java class called problem1 implement the

problem 1write a java class called problem1. implement the following method in your classpublic static int

  Write a program to solve rsa

Write a program to solve RSA, Use either Java or "VERY DETAILED" pseudocode. Take input for p, q, e, the number to encrypt and the number to decrypt.

  What secret does soraya tell amir

What secret does soraya tell amir and how does amir react to this information

  The objective is to implement a menu-based system for bank

the objective is to implement a menu-based system for bank accounts in order to simulate a very simple banking system.

  Design the static method to find the smallest number

A Given a "Complex" class with all the standard methods for complex numbers, design the static method below to find and return the smallest complex number - Design the static method to find and return the smallest complex number.

  Processing file data in java

Purpose: This assignment will provide more practice in processing file data in Java.  It will also require the declaration of a class type, the creation of a list of objects, and some simple processing of the list that will involve sorting and com..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd