Vulnerability testing of key and strategic government

Assignment Help Basic Computer Science
Reference no: EM13829329

Problem:

Scenario:

You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief. Following the appointment of the new police chief, you discovered a plain text file in the root of the C: drive on a server that said "hacked by the KDC."

You have reported this to your immediate supervisor, who has assigned you to perform a penetration test on the agency's network and to perform a vulnerability assessment. Although you strongly agree with your supervisor and realize that such measures are necessary, you believe that it would be much more appropriate to outsource this to a security consulting firm.

To fulfil your supervisor's initial request, you are preparing to perform a preliminary network penetration test on your agency's network. However, you prefer to take an automated approach and are wondering if such network penetration tools exist.

Task:

A. Create a multimedia presentation (e.g., PowerPoint, Keynote) (suggested length of 15-20 slides) explaining why the vulnerability assessment for the police department's network should be outsourced by doing the following:

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

1. Explain the difference between a penetration test and a vulnerability assessment.

2. Identify the steps that should take place in a vulnerability assessment.

3. Discuss the risks involved in conducting an internal vulnerability assessment.

4. Present the steps your agency should take to conduct a vulnerability assessment with a third party, including legal considerations such as applicable laws and ramifications of ill effects or discoveries of the vulnerability assessment.

a. Justify the legal considerations you presented.

5. Include presenter notes for each slide.

Additional Information:

The scenario is from Computer Science and it is about networking security, penetration testing as well as vulnerability testing. In this scenario, a computer science professor seeks permission of police department to hack their server as well as check whether or not the server has firewalls strong enough to withstand intruder's attacks in the Powerpoint presentation.

Reference no: EM13829329

Questions Cloud

Does it stop before it reaches the floor : When you give one set of washers a downward push, does it move as easily as the other set? Does it stop before it reaches the floor? How do you explain this behavior
Problem on pushdown automaton : Consider the following Pushdown Automaton (PDA) P1:
Understanding the management assertion : 1.Understanding the management assertions related to a speci?c control is an important factor in preparing the tests of controls. Using the assertions provided below, select the management assertion(s) that relates to the purpose of the controls in t..
Observations of the water demonstrate newton law of inertia : Explain how your observations of the water demonstrate Newton's law of inertia. Draw a free body diagram of your box of water from the situation. Draw arrows for the force of gravity, the normal force (your hand pushing up on the box), and the stop..
Vulnerability testing of key and strategic government : You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief.
Describe how you would decide whether to refinance : You are considering refinancing your mortgage. Your current loan is at 7% with 14 years left and was negotiated one year ago with $2,000 closing costs. The new loan would be 5.5% for 15 years with closing costs of $1,500. Describe how you would decid..
Problem regarding the automatic log-in : Implement a servlet that presents a new user with a form containing fields for entering a user name and password (the latter should use an appropriate type of input element).
How do you see it as a factor of business : Discussion, do a little research on Globalization. Then post a few paragraphs on what globalization means to you. How do you see it as a factor of business? Of the economy? Of technology
Stan is an auditor for cartman& kenny : 1.Stan is an auditor for Cartman& Kenny, CPA. He has recently beenassigned to a new private client called Southpark Services, a provider of Web management services. Southpark has clients throughout the United States. The company manages the clients' ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd