Evaluate security testing tools in a realistic computing

Assignment Help Computer Network Security
Reference no: EM132297469

Cybersecurity and Analytics Assignment - Penetration Testing Project for eCommerce Website

Purpose of the assessment - The purpose of the assignment is to analyse the botnet attacks in cybersecurity; evaluate available defensive resolutions, and recommend a security solution.

Students will be able to complete the following ULOs:

a. Analyse cyber security threats and attacks.

b. Implement and evaluate security testing tools in a realistic computing environment.

Assessment - Penetration testing on eCommerce Website

Assignment Description -

You are a new IT engineer at PureHacking.com located in Australia.

Your client is Mr. Daniel Gromer who runs a chain of clothing shops in Australia. Mr Gromer runs over 50 clothing shops in Sydney and Melbourne targeting female customers in their early twenties with moderate budget. Mr. Gromer has recently taken an interest in online business as he realized that many of his competitions have moved onto the online platforms reducing their expenditure significantly. Mr. Gromer has hired a team of web developers (located overseas) to develop and their new online shop is ready to launch in May 2019. Mr. Gromer has no IT background but he is aware of many cases where the websites were hijacked and lost fortunes alongside ruining their digital reputations.

Mr. Gromer has approached the PureHacking.com to assess his new eCommerce website and report any vulnerabilities ahead of its launch as Mr. Gromer is aware that he may get only one chance at the online success and if the website security is breached, he can face major loss in his investment.

Mr. Gromer informs: his eCommerce website is using WooCommerce plugin implemented on the WordPress website platform and the entire website is running on Linux webserver. The website developers have been using FTP to upload the website contents to the Linux webserver. The developers are fairly certain that their FTP passwords were complex enough not to be compromised. The password is given to PureHacking (your lecturer).

Your task is to write a report on how you will perform penetration testing on the eCommerce platform and Linux-based FTP webserver to identify their security vulnerabilities and breaches.

In this report, you are to report:

1. Potential risks and threats to the eCommerce website and their web server.

2. Penetration testing tools and technologies you will use

a. Description of tools and technologies

b. Other case episode of their usages

3. Expected outcomes from the penetration testing

4. Resources you will require to complete the penetration testing (including security credentials in red teaming).

5. Expected business benefits to the client (Mr. Gromer).

6. Conclusion and remarks on future works.

Section to be included in the report -

Introduction - Outline of the report ( in 3-4 sentences).

Report Layout - Report layout, style and language.

Potential threats and risks - Identify the potential threats and risks of your concern in terms of penetration testing planning.

Penetration tools and technologies - Recommend penetration tools and technologies and rationalize your choice.

Expected outcomes - What are the signs you are looking within penetration testing.

Resources required - Resources you will require to complete the penetration testing (including security credentials in red teaming).

Practical demonstration - Demonstration of use of ethical hacking tools in labs 5 and 6.

Business benefits - Expected business benefits to the client (Mr. Gromer).

Conclusion and remarks - Write summary of the report and future work

Reference style - Follow IEEE reference style.

Verified Expert

This assignment specially explains approximately cyber security and analytics on E-commerce platforms.Now a days cyber crime is getting boomed up through specific hackers and unknown attackers.So that they manner how everything must be controlled and managed is the undertaking for the users.So the ways wherein all the fraudulent sports takes region in E-commerce websites and the way it is able to be controlled and the safety measures which has to be taken place and benefited are noted.Various Penetration gear are widely used to display the threats and attacks.Cyber crime may be controlled by using taking essential steps and security strategies.So the entirety is explained in this project.

Reference no: EM132297469

Questions Cloud

What can be done to change the current exposure level : What are radiation exposure level. What can be done to change the current exposure level.
Develop and state your own research hypothesis : Develop and state your own research hypothesis and its corresponding two statistical hypotheses [i.e., the alternative hypothesis (H1) and the null hypothesis.
Identify the five gifts of grief using given information : Please identify the five gifts of grief and reflect on how applicable they are to your work. Do you think that these gifts apply to all sources and forms.
What do patient management protocols contribute to care : What do patient management protocols contribute to care? When and how can a caregiver depart from a patient management protocol?
Evaluate security testing tools in a realistic computing : Purpose of the assignment is to analyse the botnet attacks in cybersecurity; evaluate available defensive resolutions, and recommend a security solution
Foreseeable damages that arise from circumstances outside : Foreseeable damages that arise from circumstances outside the contract are called
Develop a mobile app for disable people : Develop a mobile app for disable people specially for blinds people - Describe your project, focusing on research questions and research method for next stage
Briefly define the concepts of reliability and validity : Psychological assessment guides are created by psychology professionals to provide the public with accurate and authoritative information appropriate.
Which an offer terminates by operation of law : Which of the following is not a way in which an offer terminates by operation of law?

Reviews

len2297469

5/1/2019 10:06:43 PM

Expected outcomes What are the signs you are looking within penetration testing 5 Resources required Resources you will require to complete the penetration testing (including security credentials in red teaming). 5 Practical demonstration Demonstration of use of ethical hacking tools in labs 5 and 6. 5 Business benefits Expected business benefits to the client (Mr. Gromer). 5 Conclusion and remarks Write summary of the report and future work 2 Reference style Follow IEEE reference style 2 Total 50

len2297469

5/1/2019 10:06:38 PM

Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 3 Report Layout Report layout, style and language 3 Potential threats and risks Identify the potential threats and risks of your concern in terms of penetration testing planning 10 Penetration tools and technologies Recommend penetration tools and technologies and rationalize your choice. 10

len2297469

5/1/2019 10:06:22 PM

Week 7 Tuesday 30th ? All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd