Write a report and develop the presentation

Assignment Help Other Subject
Reference no: EM131371797

Preventing Security Issues via a Network and Information Security Solution: 
An Analytical Report

In the following sections the details and procedures for each of these tasks is discussed:

Task 1. Research, purchase, and delivery of all equipment and software needed.

Task 2. Installation and configuration of all hardware and software.

After receiving the delivered equipment we immediately began installation.

Task 3. Implementation and monitoring of new network

Task 4. Writing, review, approval, and distribution of network documentation.

Progress report:-

Purpose
This is a progress report on the research done by the Information Security Department on possible vulnerabilities that could be exploited in Hip Hop's-main computer system through the use of a vulnerability assessment.

Task 1. To acquire a baseline of all of the systems that needs to be tested by the White Box Testing to be performed by the Information Security Department Hip Hop socks.

This was an important task to accomplish before performing task two because it gave our department and idea on where to begin our testing. Valuable time was saved because we were not working on something that could not be there. During our baseline systems test, there were several different key machines/systems that we recognized to be top priority.

These top priority systems were:

Task 2: Perform the White box test on the previously known systems.
This task out of the six tasks was the most important to complete accurately. It is a test to see if there is any potential vulnerability that can become exploited by hackers to steal important confidential information. This test would determine if an individual with previous knowledge of our system, aka an insider threat, or an individual who acquired knowledge on our system could try to actually compromise our network.

The main programs that were run to check for possible vulnerabilities are as follows:
• Khali Linux
• BackTrack
• Metasploit
• Nessus
• Nmap

After running all the following programs some initial data is starting to present itself. Some of the information being presented is both good and possibly bad but would require more in depth research to see the exact problems that could occur if the vulnerability were left open to the public.

Future Work
We are currently working with XYZ the outside contractor, to complete a Black Box test. We will then begin Task 4, to analyze all of the found vulnerabilities that could potentially be exposed from both tests.

Task 3: Perform the Black Box Test.

Task 4: Analyze the research and progress that both the White Box and Black Box test found.

Task 5: Research methods to solve any potential vulnerabilities found in the systems.

Task 6: Create a recommendation report for any of the potential vulnerabilities found.

Reflection paper:

Write a reflection paper.

Compose an approximate 750 to 1,000 word paper describing your experience writing the report and developing the presentation. Include these topics in your description:

• Your process of writing the report including determining your audience, analyzing the data, and organizing the information
• Your process of developing your presentation including identifying and organizing your content
• Your reasons for choosing the type of graphic(s) you used and why the graphic(s) are appropriate for the report and presentation

• The following is very important:
• Lessons you have learned from developing these documents
• Ways in which you can apply this experience in your professional, academic, or personal work
• Why this class worked for you or didn't.

Memo:-
Purpose
The purpose of this proposal is to request a study and analyze the implementation and eventual widespread use of a policy that will reduce the threat of a current or former employee divulging sensitive or proprietary company information to a competitor or a current employee accidentally leaking information due to an unintentional data spill.

Tasks
In order to solve the problem, I am proposing that these tasks be completed:

Task 1: Consult case-study data on similar problems found in organizations and annotate how the problem was fixed for that organization.

Task 2: Search online internet resources/library databases for more information on mitigating the insider threat and implementing a solution within an organization.

Task 3: Survey of current and former IT security professionals on ideas for securing protected company information/access to company resources.

Task 4: Research successful companies with comprehensive insider threat policies already implemented.

Schedule: A graph/timeline works well for this

Task 1: Determine the needs of company

Task 2: Research Display Sizes

Task 3: Research XYZ

Task 4: ResearchABC

Task 5: Final Report / Implementation

Attachment:- Assignment.rar

Reference no: EM131371797

Questions Cloud

Define statistics with citation and reference : Define statistics with citation and reference. Contrast quantitative data and qualitative data. Use two Peer Reviewed references. Evaluate tables and charts used to represent quantitative and qualitative data.
Hot to transfer heat : Thermal conductors don't have to be hot to transfer heat. a) According to Ch.16, explain a situation when an ice cube would still transfer heat to another object it is in contact with ? and B) What is a medium?
Which is proper response with regards to length of copyright : BAM 530- From an ethical perspective, which is the proper response with regards to the length of a copyright? The EEO laws require an employer to give greater care to ____________ than many employers did prior to the laws.
Heat to the environment : As 390 g of hot milk cools in a mug, it transfers 30,000 J of heat to the environment. What is the temperature change of the milk? The specific heat of milk is 3.9 J/g·°C. Show your work for credit.
Write a report and develop the presentation : Compose a paper describing your experience writing the report and developing the presentation.- Analyze the research and progress that both the White Box and Black Box test found.
What should sparrow pharmaceuticals do : What should Sparrow Pharmaceuticals do? Do you think it is ethical to use customer information across multiple divisions of the same company? Explain.
How each style would affect the way he would communicate : Explain how each style would affect the way he or she would communicate, negotiate, and apply this to interpersonal situations.
Define vector b and the stiffness matrix a for the system : ME209 Mathematical Modelling and Analysis Assignment - Framework Design. Define vector B and the stiffness matrix A for the system in Matlab and compute the unknown vector X using matrix methods using Matlab
Briefly describe the three aspects : BUS 101 - Briefly describe the three aspects of TPG's advertising which the ACCC considered to be defective and what two ways did the Full Court take a different approach from that of the primary judge in deciding whether the TPG advertising was mi..

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd