Summarize the footprinting analysis of the company selected

Assignment Help Management Information Sys
Reference no: EM131299543

Assignment: LASA: Security Review Report

Consider the following:

Providing a secure information systems environment requires taking a proactive approach to security. One way to do this is by hiring external security consultants or auditors to evaluate the security of an organization's network.

Assume that you have been selected as the security consultant to perform a security review for an organization of your choice. The organization that you select for this assignment should have a public-facing website and, at minimum, one web application that can be used for this task.

You have been asked to review the website security of the organization of your choice and any web applications that are part of this site. Security risks such as SQL injection and social engineering should be considered.

For this assignment, you should begin with a footprinting analysis (security reconnaissance) of the selected organization. Gather as much background information on the organization and its website as you can.

Tasks:

Prepare an 8- to 10-page report on the following aspects:

1. Summarize the footprinting analysis of the company you selected.
2. Explain how the information gathered during your footprinting analysis could be utilized to initiate an attack against the organization.
3. Describe potential social engineering methods that could be used to acquire information about the organization's computing environment.
4. List at least 4-5 appropriate prevention techniques that can be used to thwart such social engineering techniques.
5. Enumerate a series of countermeasures that can be used to avoid this type of footprinting attack.
6. Identify a list of 10 web server vulnerabilities that the organization is most susceptible to.
7. Determine at least 10 threats against the organization's web applications that pose the greatest risk to the organization.
8. Describe how SQL injection could pose a potential security threat to the organization's web applications.

Your final deliverable will be 8-10 pages in length; utilize at least 3-5 scholarly sources in your research. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Reference no: EM131299543

Questions Cloud

Provide an overview of the types of fee income : Provide an overview of the types of fee income your bank is generating.- How does it compare to the other income? What would their net income look like if you removed the fee income?
Evaluate the major sources of ethical problems in derivative : Evaluate ethical frameworks that may guide personal ethical decision-making when involved in derivatives or commodity markets.
Restrictions create jobs : Why do nations adopt trade restrictions? What impact do trade restrictions have on the economy? Do trade restrictions create jobs?
The factors in a fama french multifactor model : For a large-company stock mutual fund, would you expect the betas to be positive or negative for each of the factors in a Fama-French multifactor model?
Summarize the footprinting analysis of the company selected : Summarize the footprinting analysis of the company you selected. Explain how the information gathered during your footprinting analysis could be utilized to initiate an attack against the organization.
What value would you expect for alpha : If the market is efficient, what value would you expect for alpha?- Do your estimates support market efficiency?
What type of positive or negative impact has your technology : What type of positive or negative impact has your technology topic had on society over the past 5 years? What opportunities have now become available because of the advent of your technology topic?
Write an expression in the corresponding fourier series : Find the first five nonzero Fourier coefficients of the shifted and offset square wave in Figure P13-9. Use your results to write an expression in the corresponding Fourier series.
What are some reasons a user might have javascript disabled : What are some reasons a user might have JavaScript disabled? What kind of variable typing is used in JavaScript? What benefits and dangers arise from this? Compare graceful degradation with progressive enhancement.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss about the health information management system

Determine what you believe to be the most critical factor for the successful implementation of a health information management system. Justify your response.

  Cloud computingi would say that cloud computing as a whole

cloud computingi would say that cloud computing as a whole is nothing new. i like the definition that some people use

  How the tool or tools will be used in the selection process

Identification of the tool or tools to be used and ways in which technology can be used to make the tool(s) more effective.

  What the role of an internal it audit group in organization

What is the role of an internal IT audit group in an organization? Why is having such a group important for an organization and why should it report outside the normal IT reporting channels

  Find the standard time for the process

A hotel housekeeper, Alison Harvey, was observed five times on each of four task elements, as shown in the following table. - On the basis of these observations, find the standard time for the process.

  Produce a coherent srategic plan for a fictitious

Producing a Coherent Srategic Plan for a fictitious IS business - Drawing from several resources (the work you did in previous modules, material covered in the reading in this course, and additional research),

  Develop a research paper on a health care technology

Health Care Information Systems are important in dispensing of information throughout the organization. You will develop a research paper on a health care technology that has become essential to the sharing of information via electronic communicat..

  How information technology mediates the global economy

INFO 333 - Ethical and Cultural Issues in IS. You are required to select one of the following as your essay topic (please include the topic on your Title page): Cyber-bullying in New Zealand - an ethical analysis of the misuse of mobile devices and H..

  Dynamic or static routing protocol

Imagine that you have been hired as a network engineer in a company that uses Cisco routers. You will be responsible for configuring and managing four (4) routers. Determine whether you would use a dynamic or static routing protocol

  Create a risk assessment matrix for the integration

Assignment: Create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm

  Provide insight into likelihood of certain threats occurring

Once the protocols have been analyzed, students will synthesize this knowledge to provide insight into the likelihood of certain threats occurring. The skills acquired from this exercise will prove to be beneficial during the final stages of design..

  Draw a systems diagram that will represent carent

List the possible external environmental pressure points faced by CaRent. Also list the various systems components of CaRent such as inputs and outputs, various sub-systems, interfaces, etc. Draw a systems diagram that will represent CaRent usin..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd