Research and evaluate security testing software

Assignment Help Management Information Sys
Reference no: EM131453525

CMIT 321 Executive Proposal Project

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal.

Project Deliverable 

  • Using the Case Study presented in this document, to complete an executive proposal.
  • Provide a three to five page proposal summarizing purpose and benefit of chosen security software to the executive management team.
  • The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats.
  • The proposal should effectively describe the software in a manner that will allow the executive team members to understand the purpose and benefits of the software to approve purchase.

Guidelines

  • Evaluate and select a security tool for recommendation that you learned about in the iLabs modules or the EC-Council text books.
  • The proposal document must be 3 to 5 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects.
  • At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References."
  • Appropriate citations are required. See the syllabus regarding plagiarism policies.
  • This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity.
  • The paper is due during Week 7 of this course.

Project Description

The purpose of project is to write an executive proposal for a fictitious company called Information Assurance Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits.

Suggested Approach

1. Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook.

2. Determine whether the tool would be beneficial in testing the security of a corporate network.

3. Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.

4. Include 3rd party endorsements and case studies about the tool.

5. Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab.

Attachment:- Assignment File.rar

Reference no: EM131453525

Questions Cloud

Contact a disaster preparedness person : Interview your contact, asking the following questions: What do you consider to be the top three disasters for which you prepare
Explain why some markets are developing faster than others : Explain why some markets are developing faster than others. In your opinion, what trade theories support the recent rise of China and India on the global stage?
What are the way in which trustworthiness can be established : Explain and differentiate between the four different types of qualitative research. What are some advantages and disadvantages of each type?
Impact of time management in the workplace : This question involves using your critical-thinking skills to describe the impact of time management in the workplace.
Research and evaluate security testing software : The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review
Project closure and the post-implementation review : Identify risk drivers in your project and the risks associated with each and explain how the risks you identified could impact the project, and propose strategies to mitigate each risk.
Design strategies for effective charts and graphs : 1. Utilize the Library's search engine to locate and read through the following articles that discuss design strategies for effective charts and graphs:
Does equating status with authority cause confusion : As a professional nurse, what are some ways in which you are able to reach out to members of the community who do not have access to healthcare reform?
What are the major staffing and human resource issues faced : Who comprise the target population being served by the various programs provided by your chosen facilities?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd