Research a security testing software tool

Assignment Help Software Engineering
Reference no: EM13755869

Write an executive proposal for a fictitious company called Quantum Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits.

Suggested Approach

1. Research a security testing software tool that you practiced.

2. Determine whether the tool would be beneficial in testing the security of a corporate network.

3. Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.

4. Include 3rd party endorsements and case studies about the tool. 5. Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab.

Company Description Quantum Research Corporation

Quantum Research is a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Quantum Research is on its way to becoming a major player in the medical research and development industry. However, due to its success, Quantum Research has also become a major target of cybercriminals. Quantum Research has been the victim of cybercriminal attempts to steal intellectual property and sell it to Quantum Research's competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2010, Quantum Research was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Quantum Research's public website and several Denial of Service attacks at different times over a 8 month period that brought the corporate network to its knees. These attacks had a major impact on Quantum Research's ability to conduct business and resulted in undesirable publicity for the company. Regardless of its security problems, Quantum Research has continued to grow as a company. Its research and development departments have grown over the years, due to the expansion of the company, in proportion to the increase in its business making up over 40% of the human resources. Quantum Research's innovative research and development information is paramount to its continued success as a company. Although, no known attacks have occurred in last 18 months, the security of its network and intellectual property is still a major concern for the company. Because Quantum Research is a still fairly young company, management has been hesitant to budget for expensive security projects. However, this point of view is beginning to change. Particularly, because one of Quantum Research's competitors, a major player in the medical research and development industry for over 40 years, experienced a loss of hundreds of millions of dollars in research data that was stolen from its corporate network by cyber thieves. Background and your role.

Reference no: EM13755869

Questions Cloud

Compounding interest and the banker : There are many factors influencing the cost of money for both individuals and corporations. Suppose you deposit money in an interest bearing account and at the same time borrow a bit of money from the same bank.
Cost-volume-profit analysis : How does the firm use "Cost-Volume-Profit Analysis" to assess performance? How would you use such a system to measure how costs change as production changes? How do you develop a "break even analysis" for a given firm and how would you use it?
Write a shell script named grepdir : Write a shell script, named grepdir.sh, that searches for a pattern in a directory, and all of its subdirectories.The starting directory is the first argument, the pattern is the second parameter, and the options for grep are all succeeding paramet..
Financial reports required of all not-for -profits : What are the financial reports required of all not-for -profits? What additional report is required for voluntary health and welfare organization?
Research a security testing software tool : Research a security testing software tool that you practiced. Determine whether the tool would be beneficial in testing the security of a corporate network
Explain why openid offers users greater convenience : Explain why OpenID offers users greater convenience and security than the current system. Would you consider using an identity provider to access content on the Web? Why or why not
Explain the ethics of watergate and how it affected america : Explain the ethics of watergate and how it affected america.
When colonists protested the stamp tax with the cry : When colonists protested the Stamp Tax with the cry "no taxation without representation," George Grenville argued that
What is the number of call attempts during the busy hour : What is the number of call attempts during the busy hour at the company's location? What is the traffic load in Erlangs during the busy hour? Show calculation and units

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd