Vulnerability testing of key and strategic government

Assignment Help Basic Computer Science
Reference no: EM13829329

Problem:

Scenario:

You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief. Following the appointment of the new police chief, you discovered a plain text file in the root of the C: drive on a server that said "hacked by the KDC."

You have reported this to your immediate supervisor, who has assigned you to perform a penetration test on the agency's network and to perform a vulnerability assessment. Although you strongly agree with your supervisor and realize that such measures are necessary, you believe that it would be much more appropriate to outsource this to a security consulting firm.

To fulfil your supervisor's initial request, you are preparing to perform a preliminary network penetration test on your agency's network. However, you prefer to take an automated approach and are wondering if such network penetration tools exist.

Task:

A. Create a multimedia presentation (e.g., PowerPoint, Keynote) (suggested length of 15-20 slides) explaining why the vulnerability assessment for the police department's network should be outsourced by doing the following:

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

1. Explain the difference between a penetration test and a vulnerability assessment.

2. Identify the steps that should take place in a vulnerability assessment.

3. Discuss the risks involved in conducting an internal vulnerability assessment.

4. Present the steps your agency should take to conduct a vulnerability assessment with a third party, including legal considerations such as applicable laws and ramifications of ill effects or discoveries of the vulnerability assessment.

a. Justify the legal considerations you presented.

5. Include presenter notes for each slide.

Additional Information:

The scenario is from Computer Science and it is about networking security, penetration testing as well as vulnerability testing. In this scenario, a computer science professor seeks permission of police department to hack their server as well as check whether or not the server has firewalls strong enough to withstand intruder's attacks in the Powerpoint presentation.

Reference no: EM13829329

Questions Cloud

Does it stop before it reaches the floor : When you give one set of washers a downward push, does it move as easily as the other set? Does it stop before it reaches the floor? How do you explain this behavior
Problem on pushdown automaton : Consider the following Pushdown Automaton (PDA) P1:
Understanding the management assertion : 1.Understanding the management assertions related to a speci?c control is an important factor in preparing the tests of controls. Using the assertions provided below, select the management assertion(s) that relates to the purpose of the controls in t..
Observations of the water demonstrate newton law of inertia : Explain how your observations of the water demonstrate Newton's law of inertia. Draw a free body diagram of your box of water from the situation. Draw arrows for the force of gravity, the normal force (your hand pushing up on the box), and the stop..
Vulnerability testing of key and strategic government : You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief.
Describe how you would decide whether to refinance : You are considering refinancing your mortgage. Your current loan is at 7% with 14 years left and was negotiated one year ago with $2,000 closing costs. The new loan would be 5.5% for 15 years with closing costs of $1,500. Describe how you would decid..
Problem regarding the automatic log-in : Implement a servlet that presents a new user with a form containing fields for entering a user name and password (the latter should use an appropriate type of input element).
How do you see it as a factor of business : Discussion, do a little research on Globalization. Then post a few paragraphs on what globalization means to you. How do you see it as a factor of business? Of the economy? Of technology
Stan is an auditor for cartman& kenny : 1.Stan is an auditor for Cartman& Kenny, CPA. He has recently beenassigned to a new private client called Southpark Services, a provider of Web management services. Southpark has clients throughout the United States. The company manages the clients' ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain it ethics and responsible conduct

Specify the main reasons why green computing should be part of any organization's social responsibility posture. Next, propose three (3) actions that IT organizations could take to reduce their carbon footprint.

  Explaining origins or genesis of wireless networking

Explain origins/genesis of wireless networking.

  Determine physical address that code byte fetched

Suppose the same code segment base what physical address will code byte be fetched from if instruction pointer contains 539CH?

  Write lines of code as instructed in steps

Write lines of code as instructed in Steps

  Possible particle configurations

consider a system with n=15 bins that can be filled with exactly one and only one particle. Assume there are two types of particles: type 1 and type 2.

  Assess your knowledge and growth

Explain what you learned about the Website you selected by looking at the source code. (i.e., the version of HTML that was used, comment tags, if the head elements were marked, and if so, the type of information they contained.) Thinking back to the ..

  Search the web for steganographic tools

Search the Web for steganographic tools.

  Memory allocation errors

The application should display all daily. Use a user-defined function as handler of memory allocation errors. The user-defined function should be registered as a default handler of new failures temperatures as well as average weekly temperatures in a..

  What is the server IP address

Use Wireshark tool to capture packets when you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet.

  Problem outlining the business risks

Ddescribe the problem outlining the business risks you identify in the current description - It is also important to list any questions that need to be directed to, and answered by, the sponsor in preparation for the business case.

  Write a program that will read in a file of student academic

Write a program that will read in a file of student academic credit data and create a list of students on academic warning. The list of students on warning will be written to a file. Each line of the input file will contain the student name

  Data governance improvements

Data Governance Improvements

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd