Determine whether the tool would be beneficial in testing

Assignment Help Software Engineering
Reference no: EM13854502

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal.

Project Deliverable

• Using the Case Study presented in this document, to complete an executive proposal.

• Provide a three to five page proposal summarizing purpose and benefit of chosen security software to the executive management team.

• The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats.

• The proposal should effectively describe the software in a manner that will allow the executiveteam members to understand the purpose and benefits of the software to approve purchase.

Project Description:

The purpose of project is to write an executive proposal for a fictitious company called Advanced Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits.

Suggested Approach

1. Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook.

2. Determine whether the tool would be beneficial in testing the security of a corporate network.

3. Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.

4. Include 3rd party endorsements and case studies about the tool.

5. Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab.

Reference no: EM13854502

Describe functional and nonfunctional requirements

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific

Describe purpose of the three primitive control structures

List, and briefly describe the purpose of, the three primitive control or logic structures. (Hint: These structures are given in the Programming Methodologies section of thi

Research an issue related to information technology ethics

For this assignment, you will research an issue related to information technology ethics. You may want to select a topic you feel will have an impact on your professional li

Program for alpha testing

At this point, you want to put together the work that has been completed to deliver a working program for alpha testing. You will combine the elements you have written to th

Draw a class diagram of structure of monitoring station

Printer, on which the readings from these three sensors are shown. Readings are taken checkpoint. Draw a class diagram summarizing the structure of the monitoring station.

Bank customer withdrawing money from an atm

Describe (in a one to two (1-2) page narrative) a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an

Aspect of the information system

Think about a narrow topic or application by selecting a specific real or fictional company and a specific business process within that company or even a specific aspect of

Discuss the nature of the attacker

Discuss the nature of the attacker, their motivations, the nature of the vulnerability that they exploited, the assets attacked, the consequences of the attack and any defen


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd