Scope of work for penetration test

Assignment Help Computer Engineering
Reference no: EM13818837

• Scope of Work for Penetration Test

Assignment Requirements:

You work for EGS Testing Solutions; your company is involved in testing related to access control systems. A large, private fitness club contacted your company because their Web server was hacked. The fitness club has a corporate office with 50 workstations, 4 application servers, 2 e-mail servers, 2 Web servers, and 129 franchisees with 10 workstations and about 3,500 members at each location. Except for the equipment at the franchisees' locations, all other equipment resides at the central headquarters.

The fitness club was unsure whether the Web server hacking took place because of the former administrator, who quit under less than amenable circumstances, or if an external party had found their "Achilles heel." The perpetrator was able to access the corporate Web server by using the remote login of the Microsoft (MS) Windows network administrator.

Once the hack was realized, the administrator was forced to shut down the connections to all their 129 franchisees that needed access to the corporate Web server. The franchisees require access to the Web server to review their customers' personal information, fitness progress, and goals as well as to share information with the corporate headquarters in a secure manner. Members and club staff also make periodic payments for dues and services using this system, including credit card payments.

Your company has been engaged to provide a cost-effective solution that would allow the new administrator to do the following:

• Control access to resources by preventing unauthorized users from logging in to privileged areas.

• Audit and review user activities to prevent future hacks that could compromise network integrity.

• Change the existing system to strengthen it as necessary.

• Add technology, as necessary, to detect security breaches.

To be able to develop a cost-effective solution, your company must focus on developing a reasonable and cost-effective testing plan to identify any weaknesses in the network.

Develop a comprehensive and ongoing vulnerability and penetration test plan. Include solutions in the test plan for unauthorized access in the corporate workstations, application servers, mail and Web servers, and wireless routers.

Reference no: EM13818837

Questions Cloud

Write review on a management problem and proposed resolution : Write a 10 page literature review on a Management "Problem" and Proposed "Resolution". Because this is the Independent Study writing course.
Describe what specifically medical marijuana : What are the same events in this same perceptive: For example, state where marijuana use is legal social movement or group that advocate for the decriminalization of medical marijuana.
What is the break-even price for the toy truck : Now the original manufacturer is deciding whether they should continure production of the toy truck. If the estimated demand is 100,000 trucks, what is the break-even price for the toy truck? should you shut down?
Types of organizational cultures : What is organizational culture? What are the three [3] levels of organizational culture? What are the four [4] types of organizational cultures
Scope of work for penetration test : Scope of Work for Penetration Test
Create a program that develops an amortization schedule : Your project as a programming consultant is to create a program that develops an amortization schedule. Your program should be written as a Java applet. The applet input will be the loan amount, annual percentage rate (APR), and the number of years t..
Write a paper on labor and employment law : Write a seven pages paper on labor and employment law. Any topic on Unions and something new that you have learned. must have 10 sources and they can only be journals and peer reviews no articles.
The mutex and condition portions of messagesystem : the mutex and condition portions of MessageSystem
Analyze various codes regarding discretionary employee : Analyze the various codes and acts regarding discretionary employee benefits discussed in Chapter "Contextual Influences on Compensation Practice" and determine which code or law has had the greatest impact on the largest number of organizations.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Why is it significant to define the primary keys of a file

your supervisor has approved your normalized versions of the database. your team members were given copies. one of the

  What is the wavelength of the light used

if the distance between the first and fifth maxima of a double slit pattern is 1,2 mm and the slits are separated by 0,15 mm with the screen 70 cmfrom the slits,what is the wavelength of the light used?

  Build a java application that prompts a user for a full name

Write another Java application that accepts a user's password from the keyboard. When the entered password is less than six characters, more than 10 characters, or does not contain as a minimum one letter and one digit, prompt the user again.

  Protecting against the attack

Major corporations, governments, and the other organizations are hacked every week, mostly by the means of phishing the attacks. Explain how users and IT organizations must arm themselves against these attacks.

  The cpu of a personal computer''s hardware

Discuss in detail \CPU of a personal computer's hardware, and define how the characteristics of that aspect affect overall computer performance.

  Use ezcountour to create a contour map of z

Generate a combination surface and contour plot of Z, using ezsurfc.

  Describe and discuss some of the issues you had while

describe and discuss some of the issues you had while configuring your machine and environment to meet the requirements

  Explain why dfs trees cannot contain cross edges it may

a explain how a dfs can be used to look for cycles in a graph.b explain why dfs trees cannot contain cross edges. it

  How to find the number of characters in a string

How to find the number of characters in a string

  Which technology helps to make employee''s training cheaper

which technology helps to make employee's training cheaper, more individual and more effective. Based on your experience, describe a method that exploits (any form of) educational technology and specify its contribution. If possible, present non-tr..

  You are a systems developer for a company you are familiar

you are a systems developer for a company you are familiar with. the company wants to implement a new accounting

  Write a game program guess which tries to guess

You will want to keep track of the range of numbers that might have been chosen based on the answers that have been given so far until there is only one number left. You can approximately divide an integer by 2 by right-shifting it by one bit.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd