Vulnerability testing of key and strategic government

Assignment Help Basic Computer Science
Reference no: EM13829329

Problem:

Scenario:

You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief. Following the appointment of the new police chief, you discovered a plain text file in the root of the C: drive on a server that said "hacked by the KDC."

You have reported this to your immediate supervisor, who has assigned you to perform a penetration test on the agency's network and to perform a vulnerability assessment. Although you strongly agree with your supervisor and realize that such measures are necessary, you believe that it would be much more appropriate to outsource this to a security consulting firm.

To fulfil your supervisor's initial request, you are preparing to perform a preliminary network penetration test on your agency's network. However, you prefer to take an automated approach and are wondering if such network penetration tools exist.

Task:

A. Create a multimedia presentation (e.g., PowerPoint, Keynote) (suggested length of 15-20 slides) explaining why the vulnerability assessment for the police department's network should be outsourced by doing the following:

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

1. Explain the difference between a penetration test and a vulnerability assessment.

2. Identify the steps that should take place in a vulnerability assessment.

3. Discuss the risks involved in conducting an internal vulnerability assessment.

4. Present the steps your agency should take to conduct a vulnerability assessment with a third party, including legal considerations such as applicable laws and ramifications of ill effects or discoveries of the vulnerability assessment.

a. Justify the legal considerations you presented.

5. Include presenter notes for each slide.

Additional Information:

The scenario is from Computer Science and it is about networking security, penetration testing as well as vulnerability testing. In this scenario, a computer science professor seeks permission of police department to hack their server as well as check whether or not the server has firewalls strong enough to withstand intruder's attacks in the Powerpoint presentation.

Reference no: EM13829329

Questions Cloud

Does it stop before it reaches the floor : When you give one set of washers a downward push, does it move as easily as the other set? Does it stop before it reaches the floor? How do you explain this behavior
Problem on pushdown automaton : Consider the following Pushdown Automaton (PDA) P1:
Understanding the management assertion : 1.Understanding the management assertions related to a speci?c control is an important factor in preparing the tests of controls. Using the assertions provided below, select the management assertion(s) that relates to the purpose of the controls in t..
Observations of the water demonstrate newton law of inertia : Explain how your observations of the water demonstrate Newton's law of inertia. Draw a free body diagram of your box of water from the situation. Draw arrows for the force of gravity, the normal force (your hand pushing up on the box), and the stop..
Vulnerability testing of key and strategic government : You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief.
Describe how you would decide whether to refinance : You are considering refinancing your mortgage. Your current loan is at 7% with 14 years left and was negotiated one year ago with $2,000 closing costs. The new loan would be 5.5% for 15 years with closing costs of $1,500. Describe how you would decid..
Problem regarding the automatic log-in : Implement a servlet that presents a new user with a form containing fields for entering a user name and password (the latter should use an appropriate type of input element).
How do you see it as a factor of business : Discussion, do a little research on Globalization. Then post a few paragraphs on what globalization means to you. How do you see it as a factor of business? Of the economy? Of technology
Stan is an auditor for cartman& kenny : 1.Stan is an auditor for Cartman& Kenny, CPA. He has recently beenassigned to a new private client called Southpark Services, a provider of Web management services. Southpark has clients throughout the United States. The company manages the clients' ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How repeated measurement enhanced accuracy

Assume that hypothesis to be tested was that girls are taller than boys. This time boy and the girl were each measured 30 times with ruler which read to 1,400 of an inch.

  A project plan to strategically integrate all systems

Currently the Chief Information Officer (CIO) for an innovative Internet-based company with gross revenues of more than $35 million dollars per year. During an executive leadership meeting, you were told that your company will be merging with a..

  Create a class method to calculate and return the amount

Create a class method to calculate and return the total amount for the product based on the quantity on hand and the product price.

  Create a flowchart and a storyboard

Use the information below to create a storyboard (which can be a text based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you woud program) to solve each problem. You may use Microsoft Word® for your..

  Methods for communication

You will submit a two-part document. In the first part, you will submit a written report in which you select the methods for communication and collaboration that best fit your area of focus and implement them as a training tool for your new Techni..

  Explain why it is important to document quality procedures

Explain why it is important to document quality procedures at the beginning of a project rather than later on. In addition, think about 2 advantages and 2 disadvantages of using standards for documentation in each of the software phases.

  Algorithms for finding possible winers-analysing complexity

Create algorithms for finding the possible winers and the Condorcet winner with analysing its complexity.

  Calculate the reliability of a hard disk drive

Calculate the reliability of a hard disk drive with an MTBF of 2,499 hours during the last 40 hours of this month. Assume e = 2.71828 and use the formula: reliability(t) = e -(1/MTBF)(t)

  Assignment on the virtual memory manager

Most operating systems use a virtual memory manager (VMM) whose responsibility is to manage the relationship between the virtual organization of memory as seen by an application with the physical organization of memory from the operating system's ..

  Significant questions software installed by cable personnel

Interesting post on the computer discussion site (Slashdot) raises some significant questions about software installed by cable personnel.

  Public boolean chackanagram

write the anagramList() chackanagram. checkAnagram returns true if its two Word parameters have original words that are nagrams. If not, checkAnagram returns false. use the ethod header below to write checkanagram. Assume that all Word methods work a..

  Write a complete program that will open a file

write a complete program that will open a file called numbers.txt that contains only integers separated by some white space characters. Your program should add up all of the numbers and print out the sum and the average of all the integers in the ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd