Evaluate security testing software

Assignment Help Basic Computer Science
Reference no: EM13762643

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal. Project Deliverable

• Using the Case Study presented in this document, to complete an executive proposal.

• Provide a three to five page proposal summarizing purpose and benefit of chosen security software to the executive management team.

• The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats.

• The proposal should effectively describe the software in a manner that will allow the executive team members to understand the purpose and benefits of the software to approve purchase. Guidelines

• Evaluate and select a security tool for recommendation that you learned about in the iLabs modules or the EC-Council text books.

• The proposal document must be 3 to 5 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects.

• At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References."

• Appropriate citations are required. See the syllabus regarding plagiarism policies.

• This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity.

• The paper is due during Week 7 of this course. Project Description The purpose of project is to write an executive proposal for a fictitious company called Advanced Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities

before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits. Suggested Approach

1. Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook.

2. Determine whether the tool would be beneficial in testing the security of a corporate network.

3. Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.

4. Include 3rd party endorsements and case studies about the tool.

5. Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab. Company Description Advanced Research Corporation Advanced Research is a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Advanced Research is on its way to becoming a major player in the medical research and development industry. However, due to its success, Advanced Research has also become a major target of cybercriminals. Advanced Research has been the victim of cybercriminal attempts to steal intellectual property and sell it to Advanced Research's competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2011, Advanced Research was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Advanced Research's public website and several Denial of Service attacks at different times over a 9 month period that brought the corporate network to its knees. These attacks had a major impact on Advanced Research's ability to conduct business and resulted in undesirable publicity for the company.

Reference no: EM13762643

Questions Cloud

Planning for data collection : The scenario and formulate at least five questions that you could use to evaluate patient satisfaction.
What presentational media can you use : What presentational media can you use to enhance an oral presentation, other than Microsoft PowerPoint
Cryptographic tunneling and the osi model : Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.
Find a news article that is about a microeconomic : Find a news article that is about a microeconomic topic that we have covered during this class. The article can be from the internet, newspaper, or a magazine.
Evaluate security testing software : The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowle..
Problems related to matlab : solve the system for the least-squares estimates of Δρi.
What are the main reasons why countries trade : What are the main reasons why countries trade? Are there winners and losers with free trade and export? What is the effect of trade on the unemployment rate in the United States? Please provide concrete example. Write your initial response in four..
What is shakespeare telling his audience about women : What is Shakespeare telling his audience about women through these characters? How might Queen Elizabeth have reacted to Shakespeare's view of women?
Difference between manual accounting-computerized accounting : You have just completed training for your new position in a large accounting firm. The trainer has covered the difference between manual accounting and computerized accounting.


Write a Review


Basic Computer Science Questions & Answers

  Describe at least 3 tables that might be used to store

Describe at least 3 tables that might be used to store information in social-networking system such as Facebook.

  How are these examples of predefined control events

How are these examples of predefined control events and its usage in programming. • Delegate - Object that contains a reference to a method - Encapsulates a method - Provides a way for a program to take alternative courses when running •

  Development of enterprise architecture-existing it resources

Discuss what concepts are important to share during this presentation in particular. Also discuss, in general, the relationship between development of enterprise architecture and existing IT resources and processes.

  Transferring of videos and music files between computers

Transferring of videos and music files between computers

  Research paper proposal

As you are exploring different ideas for your paper, note the research paper will require you to submit 8-10 double-spaced, typed pages regarding a topic identified in the textbook or another topic relative to this course.

  Protecting browsers from dns rebinding attacks

Write a Review/Critique paper of the following articles: Collin Jackson et al., "Protecting Browsers from DNS Rebinding Attacks", In Proceedings of ACM CCS, 2009.Robin Sommer and Vern Paxson, "Enhancing Byte-Level Network Intrusion Detection Signat..

  Explain customer relationship management system

Describe what do you mean by a "customer relationship management system". Write and explain several categories of CRM systems.

  Explain what aspects of the system should be evaluated

What aspects of the system do you think should be evaluated. Are those aspects considered in the evaluation. What is the experimental testbed used. What experiments were performed. Details of experimental results. What aspects of the system were n..

  How to improve those and other issues as needed

Write suggestions on how to improve those and other issues as needed. Your suggestions should also be based on my Powerpoint presentations and technical web pages, books or articles.

  What is the difference between text i/o and binary i/o

What is the difference between text I/O and binary I/O?

  Designing a star schema

Designing a Star Schema

  Formulas and functions in excel

you must submit your training outline which includes topics and sub topics and time estimates. It should be professional and organized. If you take information from another source - include APA citations. each member of your team must train on a ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd