Evaluate and select a security tool for recommendation

Assignment Help Computer Network Security
Reference no: EM131274239

Project Assignment

Use the Case Study presented in this document, to complete an executive proposal.

Provide a 3 - 5 page proposal summarizing the purpose and benefit of the chosen security software to the executive management team.

You will evaluate and test security testing software for the purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats.

The proposal should effectively describe the software in a manner that will allow the executive team members to understand the purpose and benefits of the software to approve purchase.

Guidelines

Evaluate and select a security tool for recommendation from the provided list of tools.

The proposal document must be 3 to 5 pages long, conforming to APA standards.

The paper must include at least 3 authoritative, outside references (anonymous authors or web pages are not acceptable). These should be listed on the last page entitled "References."

The proposal should include:

Detailed description of the software and benefits.

Include reviews, case studies and customer recommendations

Include your own hands-on experience with the tool and test results

Cost of the product. Include additional costs such as training or hardware software that might be needed in order to properly deploy manage and maintain the software.

How will the software impact the production environment? For example, the software may test for Denial of Service attacks. You need to explain any interruptions the test may have on business operations. You need to justify the need for such a test. Also explain how to you plan to minimize or prevent possible production outages.

Suggested Approach

Determine whether the tool would be beneficial in testing the security of a corporate network.

You may use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit better.
Include 3rd party endorsements and case studies about the tool.

Project Description

The purpose of project is to write an executive proposal for a fictitious company called Advanced Research Corporation. The goal of the proposal is to persuade the executive management team to approve the purchase of a security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits.

Company Description

Advanced Research Corporation

Advanced Research is a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Advanced Research is on its way to becoming a major player in the medical research and development industry. However, due to its success, Advanced Research has also become a major target of cybercriminals. Advanced Research has been the victim of cybercriminal attempts to steal intellectual property and sell it to Advanced Research's competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2011, Advanced Research was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Advanced Research's public website and several Denial of Service attacks at different times over a 9 month period that brought the corporate network to its knees. These attacks had a major impact on Advanced Research's ability to conduct business and resulted in undesirable publicity for the company.

Regardless of its security problems, Advanced Research has continued to grow as a company. Its research and development departments have grown over the years, due to the expansion of the company, in proportion to the increase in its business making up over 40% of the human resources. Advanced Research's innovative research and development information is paramount to its continued success as a company. Although, no known attacks have occurred in last 18 months, the security of its network and intellectual property is still a major concern for the company. Because Advanced Research is a still fairly young company, management has been hesitant to budget for expensive security projects. However, this point of view is beginning to change. Particularly, because one of Advanced Research's competitors, a major player in the medical research and development industry for over 40 years, experienced a loss of hundreds of millions of dollars in research data that was stolen from its corporate network by cyber thieves.

Background and your role

You are the IT Manager hired in 2012 to manage the physical and operational security of Advanced Research's corporate information system. You understand information security issues better than anyone else in the company. You also know that the network is vulnerable to outside threats because it has experienced attacks in the past and because you haven't had the resources to properly test the corporate information system to identify the vulnerabilities that might exist and take action prevent possible attacks. You have a responsibility to bring these concerns to the attention of the executive team and ask for approval to purchase the necessary testing software.

Your education and training have introduced you to variety of security tools for testing computer and network security. The majority of these tools you either only read about or have practiced using in lab environment. You have decided to research some of these tools and test them out in your own lab environment and choose one for recommendation to executive team.

You will need to present information that proves the chosen tool will be beneficial to the security of corporate information system. To accomplish this you will need to research the product, if possible, test the product in a virtual lab environment. If the tool is part of your iLab exercise, it is recommended that you practice using and testing the tool beyond the scope of the lab exercise. Based on your research and analysis, you will include this information in your proposal in way that the executive staff can understand and allowing them to make an informed decision to approve purchase of the product.

The executive management team of Advanced Research:

The software should test for one or more of the following types of attacks:

Denial of Service (DoS)
Cross Site Scripting (XSS)
Authentication Bypass
Directory Traversal
Session Management
SQL injection
Database Attacks
Password Attacks
Firewall/Router Attacks
Operating System Attacks

Choose one or more tools to use in this scenario from the list of available security tools:

N-Stalker Tool
hping3 (used in DoS attacks)
LCP
NTFS Streams
ADS Spy
Stealth Files
PWdump7
Snow Steganography
Spytech SpyAgent
Power Spy 2013
QuickStego
RainbowCrack
Ophcrack
LOphtCrack
Snort
KFSensor Honeypot IDS
Aircrack-ng for Windows
OmniPeek Network Analyzer
httprecon Tool
CurrPorts Tool
Advanced IP Scanner
ID Serve
Nmap
NetScan Tools Pro
LANSurveyor
Friendly Pinger
Global Network Inventory
Nessus Tool
Proxy Workbench
MegaPing
Colasoft Packet Builder
The Dude

Corporate Office Network Topology

The Advanced Research main research and development facility is located in Reston Virginia. You have concerns about the sensitive information that is stored at this location as well as data that transmitted over the WAN to Advanced Research's New York City headquarters location, business partners and clients. The Reston facility is also where the Advanced Research data center is located. The data center is where Advanced Research's public website, email, databases and corporate intranet are hosted. The environment contains a mix of Microsoft and *NIX technologies.

45 Windows 2008 Servers
13 Windows 2003 Servers
15 UNIX Servers
2200 Windows XP and 7 Desktops
Web Servers: Apache and IIS
Services: FTP, SMTP, DNS, DHCP, VPN
Database: SQL, Oracle and MySQL
Network: Cisco Routers and Firewalls.

Reference no: EM131274239

Questions Cloud

Create an ethical statement for the organization : Develop a funding proposal for the agency. In the funding proposal, describe resource needs in relation to resource availability, and the costs, in both human and other resource terms, in relation to the anticipated benefits (PO 8).
Conditions that make systems vulnerable : Research a specific buffer overflow attack technique of your choice.  This should be a technique that has been actively exploited in the past 5 years or is still a current threat.  Prepare a presentation on the attack that includes at least the fo..
Which fibers responsible for the clients phantom limb pain : Which fibers would most likely be responsible for causing the client's phantom limb pain?
Discriminative frequent pattern-based classification : Compare and contrast associative classification and discriminative frequent pattern-based classification. Why is classification based on frequent patterns able to achieve higher classification accuracy in many cases than a classical decision-tree ..
Evaluate and select a security tool for recommendation : The purpose of project is to write an executive proposal for a fictitious company called Advanced Research Corporation. Evaluate and select a security tool for recommendation from the provided list of tools.
Is there any evidence to support the claim : Use the University Library to investigate the claim. What does the published literature say about the issue you are investigating? What does the research reveal about how to promote healthy development in this area? What does this reveal about the..
Discriminative frequent pattern-based classification : Compare and contrast associative classification and discriminative frequent pattern-based classification. Why is classification based on frequent patterns able to achieve higher classification accuracy in many cases than a classical decision-tree ..
Is there anything that occurred in the child environment : What was the outcome of this stage for you? Did anything happen in your life prior to that stage that affected the outcome? How does the outcome from that stage affect how you are today? Provide specific details that demonstrate your understanding..
Open source or proprietary web server software : From the third e-Activity, identify a company (bank, car wash, travel agency, nonprofit, restaurant, etc.) and suggest whether you think it should choose to use Open Source or Proprietary Web Server software and explain why. Support your opinion w..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security solutions model module in skillport

Complete the Security Solutions Model module in Skillport.  Attach a copy (screen shot) of the final test page to your assignment below. Scenario: Your boss wants to know how to detect an intrusion into or an attack on the ecommerce network. Your b..

  Famous financial corporation

Your submission should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insight relating directly to the topic. Your response should reflect scholarly writing and APA stan..

  New technologies using sophisticated anti-copying measures

Which is more probably to be effective in protecting intellectual property in digital media like CDs and DVDs: tougher copyright laws or new technologies incorporating more sophisticated anti-copying measures?

  Describe the main elements of fisma in the management

From the e-Activity, describe the main elements of FISMA in the management and governance of federal information systems.

  Create list of security issues which the firm must monitor

You decide to create security checklist for New Century. Create list of security issues which the firm must evaluate and monitor. Make sure to organize items into categories which match five security levels.

  Create a memo for security controls and counter measures

Create a memo in which you do the following: Evaluate the likelihood of the threats discussed in part A. Recommend security controls and counter measures that should be instituted to mitigate these threats.

  Depending on the size of the organization you are asked to

depending on the size of the organization small medium large you are asked to assist in developing a security

  What are the various types of malware

What is buffer overflow, and how is it used against a Web server?Why does polymorphism cause greater concern than traditional malware? How does is affect detection?

  Write =on various type of utility and its use to secure data

Write a paper about various types of Utility and its use to secure the data. 8 pages start with executive summary, introduction, examples, its use in data security and conclusion.

  Create a report on the threat scope

What are the counter measures to those threats, and how do they fit within the Situational Crime Prevention framework and how does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Topographical layout of the current and planned network

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd