Summarize the footprinting analysis of the company selected

Assignment Help Management Information Sys
Reference no: EM131299543

Assignment: LASA: Security Review Report

Consider the following:

Providing a secure information systems environment requires taking a proactive approach to security. One way to do this is by hiring external security consultants or auditors to evaluate the security of an organization's network.

Assume that you have been selected as the security consultant to perform a security review for an organization of your choice. The organization that you select for this assignment should have a public-facing website and, at minimum, one web application that can be used for this task.

You have been asked to review the website security of the organization of your choice and any web applications that are part of this site. Security risks such as SQL injection and social engineering should be considered.

For this assignment, you should begin with a footprinting analysis (security reconnaissance) of the selected organization. Gather as much background information on the organization and its website as you can.

Tasks:

Prepare an 8- to 10-page report on the following aspects:

1. Summarize the footprinting analysis of the company you selected.
2. Explain how the information gathered during your footprinting analysis could be utilized to initiate an attack against the organization.
3. Describe potential social engineering methods that could be used to acquire information about the organization's computing environment.
4. List at least 4-5 appropriate prevention techniques that can be used to thwart such social engineering techniques.
5. Enumerate a series of countermeasures that can be used to avoid this type of footprinting attack.
6. Identify a list of 10 web server vulnerabilities that the organization is most susceptible to.
7. Determine at least 10 threats against the organization's web applications that pose the greatest risk to the organization.
8. Describe how SQL injection could pose a potential security threat to the organization's web applications.

Your final deliverable will be 8-10 pages in length; utilize at least 3-5 scholarly sources in your research. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Reference no: EM131299543

Questions Cloud

Provide an overview of the types of fee income : Provide an overview of the types of fee income your bank is generating.- How does it compare to the other income? What would their net income look like if you removed the fee income?
Evaluate the major sources of ethical problems in derivative : Evaluate ethical frameworks that may guide personal ethical decision-making when involved in derivatives or commodity markets.
Restrictions create jobs : Why do nations adopt trade restrictions? What impact do trade restrictions have on the economy? Do trade restrictions create jobs?
The factors in a fama french multifactor model : For a large-company stock mutual fund, would you expect the betas to be positive or negative for each of the factors in a Fama-French multifactor model?
Summarize the footprinting analysis of the company selected : Summarize the footprinting analysis of the company you selected. Explain how the information gathered during your footprinting analysis could be utilized to initiate an attack against the organization.
What value would you expect for alpha : If the market is efficient, what value would you expect for alpha?- Do your estimates support market efficiency?
What type of positive or negative impact has your technology : What type of positive or negative impact has your technology topic had on society over the past 5 years? What opportunities have now become available because of the advent of your technology topic?
Write an expression in the corresponding fourier series : Find the first five nonzero Fourier coefficients of the shifted and offset square wave in Figure P13-9. Use your results to write an expression in the corresponding Fourier series.
What are some reasons a user might have javascript disabled : What are some reasons a user might have JavaScript disabled? What kind of variable typing is used in JavaScript? What benefits and dangers arise from this? Compare graceful degradation with progressive enhancement.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Compare and contrast database backup & disaster planning

Write a research paper will describe, compare and contrast Database Backup & Disaster Planning.

  Explains the technology question listed

Technology and possibilities - Technology provides the raw material that firms use to make innovative products and services.

  Descriptive statistics using data analysis tool

Watch the video titled "Descriptive Statistics using ‘Data Analysis' tool in Excel", located at https://www.youtube.com/watch?v=5MFjwM6K5Sg. Next, speculate on the overall manner in which you would use tools, such as Excel, to apply a business cri..

  Find better solutions to information overload

Are organizations likely to find better solutions to information overload through changes to their technical systemsor their social systems -- or both?

  Disadvantages of a lock down environment in it

Disadvantages of a lock down Environment in IT - I need assistance with figuring out some disadvantages a business may encounter from a locked-down IT environment.

  What benefits and advantages does it bring to business

HC1041 Assignment Impact of IT on Business. You are to research a real life business example of your choice and the impact of IT on that business. What benefits and advantages does IT bring to business? (Revenue, flexibility, reduces cost, etc....) a..

  Advantages and disadvantages of implementing erp

What are the advantages and disadvantages of implementing ERP in a merger or acquisition and How would you minimize the cost of implementing multiple ERP systems over time

  Determine the final core levels of ftes for the icu

Determine the final core levels of FTEs for the ICU and CCU departments if RNs and LPNs work on a 4/40 and NAs work on a 5/40 scheduling plan.

  Will government health care privacy initiatives

Will government health care privacy initiatives -- such as the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. and similar laws in the U.K. encourage the development of new security techniques or technology?

  How you would start this incident off correctly by properly

An individual who was just dismissed from the company under unfavorable circumstances, pretend that your own computer is the laptop that has been secured.make the first entry in your log book and describe how you would start this incident off corr..

  Exponential price-performance improvements

Why have these two companies taken such diametrically opposite approaches? Why is Ebay in such a strong position? Digitalization of content

  Dominance theory vs pluralist theorya study two theories of

dominance theory vs. pluralist theorya study two theories of business power the dominance theory and the pluralist

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd