Information security manager for medium-sized software

Assignment Help Basic Computer Science
Reference no: EM131293512

Suppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company. The Software Development Director has asked you to provide a detailed presentation for her department regarding the most common Web application threats and the manner in which their products could compromise customer financial data. The products in question use Microsoft SQL Server databases and IIS Web servers. She has asked you to provide a report for her review before she schedules the presentation.

Write a two to four (2-4) page paper in which you:

  1. Analyze the common threats to data systems such as Web applications and data servers. Next, speculate on the greatest area of vulnerability and potential for damage and / or data loss of such data systems (e.g., SQL injection, Web-based password cracking).
  2. Devise one (1) attack scenario where a hacker could use the area of vulnerability that you chose in Question 1 in order to gain access to a network or sensitive data. Examine the primary ways in which the hacker could execute such an attack, and suggest the strategic manner in which a security professional could prevent the attack.
  3. Explore the primary role that the human element could play in adding to the attack scenario devised in Question 2. Give your opinion on whether or not the human component is critical in protection from that type of attack.
  4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe security concerns, tools, and techniques associated with Web servers and Web applications.
  • Identify the means of hacking Web browsers. 
  • Summarize the manner in which database servers and applications are compromised and examine the steps that can be taken to mitigate such risks (e.g., SQL injection).
  • Use technology and information resources to research issues in ethical hacking.
  • Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131293512

Questions Cloud

Manager in project management : Analyze the roles of the sponsor and the manager in project management. Select the role that you believe is more critical to the success of the project and explain why.
Discuss about the distribution channel strategy : Discuss about the Distribution Channel Strategy. Estimate cost of distribution channels and logistics for the 1st, 2nd, and 3rd years of operation. You may estimate distribution channel cost per unit of the assigned product. This information will b..
What do the letters rs stand for : For connecting modem a computer, a computer must be equipped with a port that conforms to the RR-32 standard of the electronic industries association of America. What do the letters RS stand for?
Cultural change and project sponsorship : Examine the primary reasons why project management causes a cultural change and the impact of that change on integrative information technology. Support your response with at least one (1) example of a cultural change that project management can c..
Information security manager for medium-sized software : Suppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company.
How you would be a great fit for each position : Write a page describing how you would be a great fit for each position and why each position would match your employment needs.
What is a security policy : 1) What is a security policy? what are the typical elements of a policy? 2) what are security controls and how do they relate to security architecture. Give a specific example.
Write a business proposal for the company-porter 5 forces : Write a business proposal for the Organization:Porter 5 Forces
Right click on database diagrams : After opening SQL Server, go to the AdventureWorks database in the left pane, expand the database, right click on database diagrams, click new database diagrams, and explore the ERD for AdventureWorks until you can identify the six tables necessar..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe the order of function execution for baseconstructor

Next, change the information in both objects by calling the GetInfo functions, and then call the WriteInfofunctionto verify that the object data has been changed.

  Local telephone calls and long distance telephone calls

Will the distinction between local telephone calls and long distance telephone calls ever disappear? What may cause this to happen?

  Resource management in an operating system

Resource management in an operating system can be operated using two ways. Give the ways in which it can be done?

  Database life cycle

Database Life Cycle

  Data file consisting of integer

Create your own data file consisting of integer, double or String values.

  Add subtraction and division operators with the customary

Start with the grammar G6, repeated here G6: ::= + | Start with the grammar G6, repeated here G6: ::= + | ::= * | ::= ( ) | a | b | c Modify it in the following ways: a. Add subtraction and division operators (- and /) with the customary precedence a..

  How has the progression of communication technology

How has the progression of communication technology affected the business environment?

  An economist for the vanda-laye corporation

You are an economist for the Vanda-Laye Corporation, which produces and distributes outdoor cooking supplies. The company has come under new ownership and management and will be undergoing changes in its product lines and operating structure.

  Human resource management challenges

A Kenya-based chain of supermarkets has been having human resource management challenges relating to cultural differences. This has caused bad blood between the Kenyan retail supervisors and junior staff in their Tanzanian outlet branch leading to..

  What other irregularities would this introduce

Make a list of differences between vectorand basic_string. Which differences are important?

  Write a shell script

Write a shell script, named grepdir.sh, that searches for a pattern in a directory, and all of its subdirectories.

  Taking the course would understand

Discuss and explain the most interesting/important topic/concept that you learned this semester in this class. Explain it in such a way that a student that was not taking the course would understand. Give details, but do not be overly technical.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd