Evaluate security testing software

Assignment Help Basic Computer Science
Reference no: EM13762643

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal. Project Deliverable

• Using the Case Study presented in this document, to complete an executive proposal.

• Provide a three to five page proposal summarizing purpose and benefit of chosen security software to the executive management team.

• The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats.

• The proposal should effectively describe the software in a manner that will allow the executive team members to understand the purpose and benefits of the software to approve purchase. Guidelines

• Evaluate and select a security tool for recommendation that you learned about in the iLabs modules or the EC-Council text books.

• The proposal document must be 3 to 5 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects.

• At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References."

• Appropriate citations are required. See the syllabus regarding plagiarism policies.

• This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity.

• The paper is due during Week 7 of this course. Project Description The purpose of project is to write an executive proposal for a fictitious company called Advanced Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities

before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits. Suggested Approach

1. Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook.

2. Determine whether the tool would be beneficial in testing the security of a corporate network.

3. Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.

4. Include 3rd party endorsements and case studies about the tool.

5. Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab. Company Description Advanced Research Corporation Advanced Research is a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Advanced Research is on its way to becoming a major player in the medical research and development industry. However, due to its success, Advanced Research has also become a major target of cybercriminals. Advanced Research has been the victim of cybercriminal attempts to steal intellectual property and sell it to Advanced Research's competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2011, Advanced Research was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Advanced Research's public website and several Denial of Service attacks at different times over a 9 month period that brought the corporate network to its knees. These attacks had a major impact on Advanced Research's ability to conduct business and resulted in undesirable publicity for the company.

Reference no: EM13762643

Questions Cloud

Planning for data collection : The scenario and formulate at least five questions that you could use to evaluate patient satisfaction.
What presentational media can you use : What presentational media can you use to enhance an oral presentation, other than Microsoft PowerPoint
Cryptographic tunneling and the osi model : Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.
Find a news article that is about a microeconomic : Find a news article that is about a microeconomic topic that we have covered during this class. The article can be from the internet, newspaper, or a magazine.
Evaluate security testing software : The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowle..
Problems related to matlab : solve the system for the least-squares estimates of Δρi.
What are the main reasons why countries trade : What are the main reasons why countries trade? Are there winners and losers with free trade and export? What is the effect of trade on the unemployment rate in the United States? Please provide concrete example. Write your initial response in four..
What is shakespeare telling his audience about women : What is Shakespeare telling his audience about women through these characters? How might Queen Elizabeth have reacted to Shakespeare's view of women?
Difference between manual accounting-computerized accounting : You have just completed training for your new position in a large accounting firm. The trainer has covered the difference between manual accounting and computerized accounting.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe the experiments needed to evaluate the design

Describe the experiments needed to evaluate the design alternatives. Give both a full factorial design and simple design. These experiments could be conducted on a simulation model or system prototype.

  Describe the organisational structure of your company

Describe the organisational structure of your company. Then formulate its mission. The mission should express all your above ideas in one sentence and Taylor-like methods are not applicable to software design and development processes.

  Adding fiber from the beginning

Adding fiber from the beginning.

  Private sub question5

Private Sub Question5

  How repeated measurement enhanced accuracy

Assume that hypothesis to be tested was that girls are taller than boys. This time boy and the girl were each measured 30 times with ruler which read to 1,400 of an inch.

  Sql ddl statements

Write appropriate SQL DDL statements for declaring the LIBRARY relational database schema below. Specify the keys, the referential integrity, and the check constraints that may apply.

  Three years for applications of information security

Five articles within the past three years for applications of information security, within healthcare organizations.

  Utilize computer paper

Develop at least three areas you can utilize to compare/contrast them (pricing, performance, availability, etc.) and then select your tools and develop your paper. You must compare/contrast at least five computer forensics tools.

  Draw the pipeline execution diagrams

In snippet A, the branch is taken twice and then not taken. In snipped B, first branch is taken once and second branch is also taken once.

  Specifically, for the session long project for this module

Specifically, for the Session Long Project for this Module, you are to review the Mitnick Security Consulting website [available at http://mitnicksecurity.com/]. Kevin Mitnick was for a number of years one of the most successful bad-guy hackers in th..

  What would be the pros and cons of selecting in-house

What would be the pros and cons of selecting in-house development versus a packaged solution for the R/Way system?

  Write a problem that prompts the user for a radius

Write a problem that prompts the user for a radius and then prints: •The area and the circumference of a circle with that radius •The volume and surface area of a sphere with that radius

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd