Vulnerability and attack analysis plan

Assignment Help Risk Management
Reference no: EM13773469

Vulnerability and Attack Analysis Plan

For this course you will assess an organization, collect information, pinpoint vulnerabilities and come up with an attack plan that should work in theory. This project is not meant to be carried out but is meant to build a plan that will be used without actually taking the steps to perform the attack.

The Outline of the Attack Plan

Develop an attack plan that covers these criteria:

1. Choose a company/organization for analysis/attack.

2. Give summary information about the organization. Remember, you have to think like an intruder - what information do you think would be relevant?

3. Find tools on the web that could help you find information about systems/networks, etc.. that could be used to find vulnerable points. Remember, you have to find this info, use tools to look for more information and vulnerabilities that you could exploit. Name these tools and what they can do to help.

4. Is social engineering an option here? What methods could you use to gather sensitive information? What questions might you ask? What kind of messages could you send? What are some physical security flaws (if any) do you think would be an option or not relevant?

5. This outline can be presented in a Power Point presentation, complete with illustrations, and references. For illustrations, screenshots can be used to display various techniques you might employ.

6. This presentation should be at least 12-15 slides, any style you wish and must have references to information you use. Keep in mind, this is not meant to be very detailed, this is just an outline of the plan. The details will go in the paper.

Reference no: EM13773469

Describe the process of performing a risk assessment

Describe the components and basic requirements for creating an audit plan to support business and system considerations. Describe the parameters required to conduct and report

Application of the concepts and techniques

Provide a preliminary list of references you intend to consult to support your entire project. In total, your outline should consist of major headings and bullet points and

Microsoft''s risk management approach

Concentrate this module's area of research on "Microsoft's risk management approach." Write a 1-2 pages APA style paper, describing each of the four phases in the security r

What are some risks of not performing the type of test

Discuss the importance of including good comments in your code. What are some things you should avoid when including comments in code. Discuss why you should always test a p

Identify a risk management process

Identify a risk management process you would employ to mitigate risks in regard to the given scenario along with a rationale (utilize contemporary and classical leadership t

Effective risk management plan

Might an effective risk management plan be considered a process that may restore all systems, businesses, processes, facilities, and people? What are the major issues to con

Paper on organization and websites for risk management

Write 2 page paper on Organization and Websites for Risk Management, I need someone to Write a no more than 2-page paper discussing what professional organizations you might j

Is the acceptable risk posture for the organization

Does a policy that addresses the need for risk management exist? Is the acceptable risk posture for the organization included in the policy? Does the policy include details ab

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd