Evaluate security testing software

Assignment Help Basic Computer Science
Reference no: EM13762643

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal. Project Deliverable

• Using the Case Study presented in this document, to complete an executive proposal.

• Provide a three to five page proposal summarizing purpose and benefit of chosen security software to the executive management team.

• The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats.

• The proposal should effectively describe the software in a manner that will allow the executive team members to understand the purpose and benefits of the software to approve purchase. Guidelines

• Evaluate and select a security tool for recommendation that you learned about in the iLabs modules or the EC-Council text books.

• The proposal document must be 3 to 5 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects.

• At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References."

• Appropriate citations are required. See the syllabus regarding plagiarism policies.

• This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity.

• The paper is due during Week 7 of this course. Project Description The purpose of project is to write an executive proposal for a fictitious company called Advanced Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities

before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits. Suggested Approach

1. Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook.

2. Determine whether the tool would be beneficial in testing the security of a corporate network.

3. Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.

4. Include 3rd party endorsements and case studies about the tool.

5. Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab. Company Description Advanced Research Corporation Advanced Research is a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Advanced Research is on its way to becoming a major player in the medical research and development industry. However, due to its success, Advanced Research has also become a major target of cybercriminals. Advanced Research has been the victim of cybercriminal attempts to steal intellectual property and sell it to Advanced Research's competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2011, Advanced Research was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Advanced Research's public website and several Denial of Service attacks at different times over a 9 month period that brought the corporate network to its knees. These attacks had a major impact on Advanced Research's ability to conduct business and resulted in undesirable publicity for the company.

Reference no: EM13762643

Questions Cloud

Planning for data collection : The scenario and formulate at least five questions that you could use to evaluate patient satisfaction.
What presentational media can you use : What presentational media can you use to enhance an oral presentation, other than Microsoft PowerPoint
Cryptographic tunneling and the osi model : Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.
Find a news article that is about a microeconomic : Find a news article that is about a microeconomic topic that we have covered during this class. The article can be from the internet, newspaper, or a magazine.
Evaluate security testing software : The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowle..
Problems related to matlab : solve the system for the least-squares estimates of Δρi.
What are the main reasons why countries trade : What are the main reasons why countries trade? Are there winners and losers with free trade and export? What is the effect of trade on the unemployment rate in the United States? Please provide concrete example. Write your initial response in four..
What is shakespeare telling his audience about women : What is Shakespeare telling his audience about women through these characters? How might Queen Elizabeth have reacted to Shakespeare's view of women?
Difference between manual accounting-computerized accounting : You have just completed training for your new position in a large accounting firm. The trainer has covered the difference between manual accounting and computerized accounting.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How to call the function to update the statistics

A function which takes as in the parameters the three counters and displays them to the screen as shown in he example below.

  A modem that uses qam-64 modulations.

My ADSL provider's twisted-pair lines provide a total bandwidth of 1.1M hertz and the provider provides me with a modem that uses QAM-64 modulations.

  Intellectual property law is a major issue facing organize

Intellectual property law is a major issue facing organizations

  Describe virtual private network (vpn) tunneling

Describe some of the PPP configuration options that a network administrator can utilize in this network technology.

  Explain why it is important to document quality procedures

Explain why it is important to document quality procedures at the beginning of a project rather than later on. In addition, think about 2 advantages and 2 disadvantages of using standards for documentation in each of the software phases.

  Demonstrate the difference between using a local

Write a program that will demonstrate the difference between using a local page replacement policy and a global one for the simple case of two processes. You will need a routine that can generate a page reference string based on a statistical model.

  Explain dual signature used in set protocol

Explain dual signature used in SET (Secure Electronic Transfer) protocol and provide example.

  Utilize computer paper

Develop at least three areas you can utilize to compare/contrast them (pricing, performance, availability, etc.) and then select your tools and develop your paper. You must compare/contrast at least five computer forensics tools.

  Draw mind map to show risks and actions and strategies

Draw a mind map to show the risks and the actions and strategies that would ensure the integrity of your data, and the optimisation of a computer.

  Two main functions of user accounts in a network

What are the two main functions of user accounts in a network?

  Rsa protocol to encrypt and decrypt messages

In this problem you are enquired to hand-turn RSA protocol to encrypt and decrypt messages by using rather smaller numbers than are used in practice, so that calculations can be done by hand.

  Describe the importance of variable naming and conventions

Describe the importance of variable naming and conventions. What makes this so important when working with a team to develop a game or application? What do you think are the implications of not naming, or not naming correctly, variables in the ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd