Review entire interactive case study for jacketx corporation

Assignment Help Management Information Sys
Reference no: EM131308782

Cyber Threats and Vulnerabilities- guide

Objectives:

(1) Assess the primary cyber threats and vulnerabilities associated with an organization's mission-critical information systems and corrective measures.

(2) Increase hands-on skills and defense strategies by attacking a web application to steal "sensitive" data.

Competencies: Teambuilding skills, Systems thinking, hands-on

Instructions:

(1) Review the entire interactive case study for Jacket-X Corporation (both parts) presented in the Course Content area of the classroom (Click the "Case Studies" link).

Analyzes and reports on the threats and vulnerabilities of the enterprise network for the Jacket-X Corporation and recommend countermeasures to address these threats and vulnerabilities.

(2) A healthcare website has vulnerabilities besides the late delivery. As a group of ethical hackers, your responsibility is to help the organization to secure the web application. The first step for you is to identify the vulnerabilities. Now go to the website to "steal" as much data as you can.

https://vlab02.pneumann.com/patients13/?bill_month=8&sec=HSPO15

(This website is preset for this class only. The data are not real. Do not attempt to attack any public websites.)

1. The target. The target website is setup for this exercise only. It is not a real healthcare website and there is no real data in the system. So students are free to practice.

2. Is the information (url) sufficient? Yes, an ethical hacker usually knows no more than a URL.

3. I have no idea how to "steal" the data. That's why we form a group. Actually it could be very easy to get some data from the website. (Will provide hints later if you couldn't figure out.) Having said that, there are other data in the system that may not be easy to "steal".

4. The goal The goal for this group exercise it to understand vulnerabilities in IT systems and most importantly looking for solutions to secure web applications. Not doing so will lead to data bleaches such as Target and many others.

After finishing the vulnerability assessment, your group needs to provide recommendations as for how to fix the problems.

The deliverable for each team is a written report. The report contains two parts: Jacker-X and Ethical Hacking. The length of this paper should be 10-15 pages double spaced. Page count does include the title page, table of contents, abstract and reference pages. (Note: including the table of contents and abstract are preferred but not required.) The page count DOES NOT include figures and tables.

Prepare your report in Word. Include a minimum of 10 sources. The citations and the reference list in the report should be formatted in accordance with APA 6th edition guidelines.

Before you submit your paper, you will need to run your assignment (part 1, Jacket-X Corporation) through Turnitin.com and receive an originality report. DO NOT WAIT TO THE LAST MINUTE TO DO THIS. It might take several hours to do this. Resubmissions can take a day or more.

After it meets all of the stated criteria, upload the paper and the originality report in the assignment folder.

Reference no: EM131308782

Questions Cloud

Specify the configuration and ticket prices for an aircraft : Bigjet plans to launch a weekly flight on a long-haul route. It faces four sets of decisions corresponding to short-run, medium-run, long-run, and very long-run operations. For the short-run, specify the configuration and ticket prices for an airc..
How to embed one into your favorite presentation program : If you don't have experience embedding a video into a presentation, research how to embed one into your favorite presentation program.
Strategic management process-vertical integration : Find a news article (from reputable sources) that discusses "a firm/company who vertically integrated in order to remain flexible and how this creates value for them".
Find the percentage of the total population : Compare this data with the unemployment data. What does this information suggest about future productivity and growth for the U.S. economy?
Review entire interactive case study for jacketx corporation : Review the entire interactive case study for Jacket-X Corporation (both parts) presented in the Course Content area of the classroom (Click the "Case Studies" link).
Strategic management process-product differentiation : Find a news article (from reputable sources) that discusses "a firm/company that is pursuing both product differentiation and cost leadership".
Discuss whether you used a handout : In small groups, discuss whether you used a handout, and your rationale. If you had to deliver the presentation again today, would you distribute a handout?
Create mock ups of screenshots : Imagine that you're planning a presentation to a group of employees. - Explain the new, online, time-off request system.
What types of reports does management need from the new eris : Rescue911 Case- What types of reports does management need from the new ERIS? Can you please go back to the concept of a shift so that I understand its implications for team availability?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are reasons why a company would choose not to globalize

How do history and geography affect the development and effectiveness of global business? What do you find interesting or surprising about the information in the video? How does it relate back to your weekly objectives? 400 words.

  Accounting information systems

1. How are flowcharts used in accounting information systems? How are DFDs similar to flowcharts? How are they different?

  Summary report of a computer crime

Computer Crime and Punishment - summary report of a computer crime or cyber crime committed by using a covert online money transfer site.

  What do you prefer a cloud -based or an on premise solution

After thinking about your project and the aforementioned questions, do you prefer an off-the-shelf system, or a custom-built solution in your organization and what about for this current (scenario project)? Which option and why or do you have no ..

  Counterintelligence initiatives

Counterintelligence initiatives - Explain What counterintelligence initiatives might you suggest I undertake?

  Application of the concepts of supply chain management

Compare the two chosen healthcare companies and how they have organized themselves in order to develop and/or sustain their competitive advantage in the marketplace - application of the concepts of Supply Chain Management to the healthcare industry..

  Difference between unit a and benchmark productivity ratio

calculate the following ratios and compare them to the benchmark values of a peer group- What would be the reasons for the difference between Unit A and the benchmark productivity ratio?

  Do you believe there are universal codes of ethics

Do you believe there are universal codes of ethics that are independent of culture or religion? Elaborate. Do you work for an organization that has clearly stated ethical standards?

  Implications of security breach

Important because of implications of security breach, laws governing protection of certain types of data, Web Based systems security and Internal security.

  Which type of cpu socket does the motherboard have

Does this motherboard have an integrated USB 3.1 10 Gb/s port? 11. What is the maximum number and type of USB ports available on the rear of the motherboard? Write the URL where you found the motherboard information.

  Analyzes the far-reaching effects to culture

In terms of rhetorical modes, this is a cause & effect paper, but I want you to go beyond simply explicating the effects of a given technology and really make an argument that analyzes the far-reaching effects to culture and the implications of th..

  Calculate rollback values for determining optimal strategy

Calculate rollback values for determining the optimal strategy - Decision tree models include such concepts as nodes, branches, terminal values, strategy, payo? distribuGon, certain equivalent, and the rollback method

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd