Detailed description of the software and benefits

Assignment Help Management Information Sys
Reference no: EM13758267

Project Description

The purpose of project is to write an executive proposal for a fictitious company called Advanced Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits

Suggested Approach

Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook.

Determine whether the tool would be beneficial in testing the security of a corporate network.

Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.

Include 3rd party endorsements and case studies about the tool.

Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab.

Company Description

Advanced Research Corporation

Advanced Research is a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Advanced Research is on its way to becoming a major player in the medical research and development industry. However, due to its success, Advanced Research has also become a major target of cybercriminals. Advanced Research has been the victim of cybercriminal attempts to steal intellectual property and sell it to Advanced Research's competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2011, Advanced Research was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Advanced Research's public website and several Denial of Service attacks at different times over a 9 month period that brought the corporate network to its knees. These attacks had a major impact on Advanced Research's ability to conduct business and resulted in undesirable publicity for the company.

Regardless of its security problems,Advanced Research has continued to grow as a company. Its research and development departments have grown over the years, due to the expansion of the company, in proportion to the increase in its business making up over 40% of the human resources. Advanced Research's innovative research and development information is paramount to its continued success as a company. Although, no known attacks have occurred in last 18 months, the security of its network and intellectual property is still a major concern for the company. Because Advanced Research is a still fairly young company, management has been hesitant to budget for expensive security projects. However, this point of view is beginning to change. Particularly, because one of Advanced Research's competitors, a major player in the medical research and development industry for over 40 years, experienced a loss of hundreds of millions of dollars in research data that was stolen from its corporate network by cyberthieves.

Background and your role

You are the IT Manager hired in 2012 to manage the physical and operational security of Advanced Research's corporate information system.You understand information security issues better than anyone else in the company. You also know that the network is vulnerable to outside threats because it has experienced attacks in the past and because you haven't had the resources to properly test the corporate information system to identify the vulnerabilities that might exist and take action prevent possible attacks. You have a responsibility to bring these concerns to the attention of the executive team and ask for approval to purchase the necessary testing software.

Your education and training have introduced you to variety of security tools for testing computer and network security. The majority of these tools you either only read about or have practiced using in lab environment. You have decided to research some of these tools and test them out in your own lab environment and choose one for recommendation to executive team.

You will need to present information that proves the chosen tool will be beneficial to the security of corporate information system. To accomplish this you will need to research the product, if possible, test the product in a virtual lab environment. If the tool is part of your iLab exercise, it is recommended that you practice using and testing the tool beyond the scope of the lab exercise. Based on your research and analysis, you will include this information in your proposal in way that the executive staff can understand and allowing them to make an informed decision to approve purchase of the product.

The executive management team of Advanced Research:

The proposal should include:

· Detailed description of the software and benefits.

· Include reviews, case studies and customer recommendations

· Include your own hands-on experience with the tool and test results

· Cost of product. Include additional costs such as training or hardware software that might be needed in order to properly deploy manage and maintain the software.

· How will the software impact the production environment? For example, the software may test for Denial of Service attacks. You need to explain any interruptions the test may have on business operations. You need to justify the need for such a test. Also explain how to you plan to minimize or prevent possible production outages.

The software should test for one or more of the following types of attacks:

· Denial of Service (DoS)

· Cross Site Scripting (XSS)

· Authentication Bypass

· Directory Traversal

· Session Management

· SQL injection

· Database Attacks

· Password Attacks

· Firewall/Router Attacks

· Operating System Attacks

Reference no: EM13758267

Questions Cloud

Chronic fatigue syndrom : Describe Chronic Fatigue Syndrom and its remedies
Are social media inherently less secure than regular email : Check out this article: How Google And 104 Other Companies Track Everywhere You Go On The Web and Are social media inherently less secure than regular email
Machine can operate for an average : A machine can operate for an average of 13 weeks before it needs to be overhauled, a process which takes 2 days. The machine is operated 5 days a week. Compute the availability of this machine.
Each component of the system has the same reliability : A Web server has five major components that must all function in order for it to operate as intended. Assuming that each component of the system has the same reliability, what is the minimum reliability each one must have in order for the overall sys..
Detailed description of the software and benefits : Detailed description of the software and benefits. Include reviews, case studies and customer recommendations, Include your own hands-on experience with the tool and test results
Consider the types of poor driving habits : Consider the types of poor driving habits that might occur at a traffic light. Make a list of the 10 you consider most likely to happen. Add the category of “other” to that list. Construct a Pareto chart showing the relative frequency of occurrence o..
Wide gap between planned results and actual accomplishments : When a software measure reveals a wide gap between planned results and actual accomplishments and this is discovered late in the project schedule, why does adding more programming and staffing resources usually result in diminished return?
Design a secure authentication technology : Make a list of access points internal and external (remote). Design a secure authentication technology and network security for GFI
Retaining the value of position : Provide analysis showing the net profit from (i) the covered call and (ii) the protective put on the expiration date assuming the stock price has fallen 20%. Which strategy is more effective at retaining the value of your position?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Project management risk managementrisk management is a

project management risk managementrisk management is a critical aspect of project management. the supply chain

  Physical access controls and logical access controls

Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy

  How many management functions were originally proposed

How many management functions were originally proposed by Henri Fayol

  Describe strategy of a technologically driven company

In this section, you should describe what "SHOULD" be the strategy of a technologically driven company. You should focus specifically on the technology strategy

  Determine how you would design the security controls

Determine how you would design the security controls to mitigate the risks involved. Determine the security defense mechanisms that you would utilize in order to secure communications from floor to floor in the office space, including equipment an..

  Explain hierarchy processes and project control systems

Project Management: Alternatives, Hierarchy Processes and Project Control Systems and Technologies - example of each type of technology and explain why you feel it fits into the category.

  Question about aspwhat are asps how have they become an

question about aspwhat are asps? how have they become an important element of e-business? what is their implication for

  How do you find the selling expense

The company does not manufacture its own skis; it purchases them from a supplier for $158 per pair. How do you find the selling expense?

  Does the implementation of new technology always mean

Question about Does the implementation of new technology always mean the end of old ways of doing things?

  How should he evaluate charlies performance

How should Fred measure success when he evaluates Gladys' performance for this project? How should he evaluate Charlie's performance

  Quality control and supply chain management

Calculate a forecast of the above demand using a 3- and 5-period moving average and Graph these forecasts and the original data using Excel. What does the graph show

  How security management can be applied at the company

Your CEO has asked you to prepare a report to explain whether or not a security plan is needed, and to clarify how security management can be applied at the company

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd