Summarize steps required to mitigate all future occurrences

Assignment Help Computer Engineering
Reference no: EM132344761

Assignment: You are a manager of a Web development team for a fictional international delivery service. Please give your fictional business a name, and provide a sentence or two of background information about the company. Your team maintains all of the e-commerce servers, including creating and updating all of the content on the Web pages and the database that stores customer information. These are mission critical servers.

You have 4 clustered nodes that are used for load balancing. These nodes are located in 4 cities around the globe. Two are in the USA, one is in Europe, and one is in Asia.

The choices of cities and countries is yours:

Node1: City___________Country___________

Node2: City___________Country___________

Node3: City___________Country___________

Node4: City___________Country___________

Each site is interconnected, and gets regular updates from the home office, located in a different city & country that you will choose.

A TCPDUMP is scheduled daily so the team can analyze real time traffic using WireShark. A team member alerts you to a potential problem found in <NODE OF YOUR CHOICE> capture. There is an alarming amount of activities from port 40452, which shows a redirect to the index.php page instead of the login.php page. It appears this node has been compromised with a SQL Injection Attack. You rely on these sites so you are unable to shut down all e-commerce activities.

For this Assignment, please write a report to the new CEO. Describe your network as you have set it up. Describe your reasoning for the way you distributed the network. Then, in fully-developed explainations, address each of the following:

1. Explain the immediate steps you would instruct your team to use to contain the attack, but also to maintain the service to the e-commerce site.

2. Summarize the steps required to mitigate all future occurrences of this type of attack, including how to verify that the vulnerability has been rectified.

3. Evaluate the OWASP Top 10 2017, and list three more potential vulnerabilities. Provide specific mitigation strategies to address each risk.

4. Use at least four quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Note: Test the links to ensure they work before submitting your paper.

5. Format your assignment according to the following formatting requirements:

• Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

• Include a reference page. Citations and references must follow professional business language format. The reference page is not included in the required page length.

Reference no: EM132344761

Questions Cloud

Find the equation of the line that passes through A and B : MAS130 Calculus and Matrix Algebra Assignment, Open Universities, Australia, find the equation of the line that passes through A and B
Focus on in order to survive in today business environment : Describe how consumers can use the Internet to shop in new ways. What must companies focus on in order to survive in today's business environment?
Examine the major disadvantages of cloud computing : Examine the major advantages and disadvantages of cloud computing for the two (2) selected organizations. Recommend whether or not each of the selected.
What are the advantages of using scientific methodology : What are the advantages of using scientific methodology when it comes to studying social phenomena?
Summarize steps required to mitigate all future occurrences : Summarize the steps required to mitigate all future occurrences of this type of attack, including how to verify that the vulnerability has been rectified.
Analyze the organization institutional environment : Analyze the organization's institutional environment. You will need to think through the different actors and institutions that might influence the organization
Contrast symmetric from asymmetric cryptography : Differentiate block ciphers from stream ciphers and contrast symmetric from asymmetric cryptography. Illustrate with examples. (
How the scientific study of social psychology is conducted : Describe what you learned about how the scientific study of social psychology is conducted. Identify the skills or abilities involved in this assignment
Evaluating security protocols and mechanisms : KIT111 - Data Networks and Security - University of Tasmania - analyse key security requirements and trends in a networking for acquiring, converting

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd