Vulnerability testing of key and strategic government

Assignment Help Basic Computer Science
Reference no: EM13829329

Problem:

Scenario:

You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief. Following the appointment of the new police chief, you discovered a plain text file in the root of the C: drive on a server that said "hacked by the KDC."

You have reported this to your immediate supervisor, who has assigned you to perform a penetration test on the agency's network and to perform a vulnerability assessment. Although you strongly agree with your supervisor and realize that such measures are necessary, you believe that it would be much more appropriate to outsource this to a security consulting firm.

To fulfil your supervisor's initial request, you are preparing to perform a preliminary network penetration test on your agency's network. However, you prefer to take an automated approach and are wondering if such network penetration tools exist.

Task:

A. Create a multimedia presentation (e.g., PowerPoint, Keynote) (suggested length of 15-20 slides) explaining why the vulnerability assessment for the police department's network should be outsourced by doing the following:

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

1. Explain the difference between a penetration test and a vulnerability assessment.

2. Identify the steps that should take place in a vulnerability assessment.

3. Discuss the risks involved in conducting an internal vulnerability assessment.

4. Present the steps your agency should take to conduct a vulnerability assessment with a third party, including legal considerations such as applicable laws and ramifications of ill effects or discoveries of the vulnerability assessment.

a. Justify the legal considerations you presented.

5. Include presenter notes for each slide.

Additional Information:

The scenario is from Computer Science and it is about networking security, penetration testing as well as vulnerability testing. In this scenario, a computer science professor seeks permission of police department to hack their server as well as check whether or not the server has firewalls strong enough to withstand intruder's attacks in the Powerpoint presentation.

Reference no: EM13829329

Questions Cloud

Does it stop before it reaches the floor : When you give one set of washers a downward push, does it move as easily as the other set? Does it stop before it reaches the floor? How do you explain this behavior
Problem on pushdown automaton : Consider the following Pushdown Automaton (PDA) P1:
Understanding the management assertion : 1.Understanding the management assertions related to a speci?c control is an important factor in preparing the tests of controls. Using the assertions provided below, select the management assertion(s) that relates to the purpose of the controls in t..
Observations of the water demonstrate newton law of inertia : Explain how your observations of the water demonstrate Newton's law of inertia. Draw a free body diagram of your box of water from the situation. Draw arrows for the force of gravity, the normal force (your hand pushing up on the box), and the stop..
Vulnerability testing of key and strategic government : You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief.
Describe how you would decide whether to refinance : You are considering refinancing your mortgage. Your current loan is at 7% with 14 years left and was negotiated one year ago with $2,000 closing costs. The new loan would be 5.5% for 15 years with closing costs of $1,500. Describe how you would decid..
Problem regarding the automatic log-in : Implement a servlet that presents a new user with a form containing fields for entering a user name and password (the latter should use an appropriate type of input element).
How do you see it as a factor of business : Discussion, do a little research on Globalization. Then post a few paragraphs on what globalization means to you. How do you see it as a factor of business? Of the economy? Of technology
Stan is an auditor for cartman& kenny : 1.Stan is an auditor for Cartman& Kenny, CPA. He has recently beenassigned to a new private client called Southpark Services, a provider of Web management services. Southpark has clients throughout the United States. The company manages the clients' ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program that creates a 4x3 array of integers

Write a program that creates a 4x3 array of integers. Populate the array with random numbers between 0 and 200. Sum up the values in each column and display the three sums to the screen.

  What operations can be used on pointer variables

In C++, what operations can be used on pointer variables? Why use these operations?

  Cryptographic tunneling and the osi model

Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.

  How to developing a class for sorting and searching

This assignment will give you practice in developing a class for sorting and searching,with a specific application in mind. The class methods can mostly be implementedby adapting algorithms which you have seen.

  Access control system

What access control system is most valuable for protecting enterprise systems? Why? What are two specific strengths and two specific drawbacks for your chosen access control system?

  Determine throughput for file transfer form one host-another

Assume Host A wishes to send the large file to Host B. Suppose no other traffic in network, Determine the throughput for the file transfer?

  Compute mean number of rounds per contention period

Determine the probability that the contention ends on round k, and compute the mean number of rounds per contention period?

  The complete procedure for enabling windows

The complete procedure for enabling Windows Remote Management and executing a command that uses the adatumAdministrator account to create a local user account for a user called Mark

  What your research aims to do

You need to describe what your research aims to do, the objectives that need to be meet to get to the final aim, the context and technical background of the work and also why it is important that this work is carried out.

  Create a program that calculates change after a purchase

Create a program that calculates change after a purchase. This will be a sequential algorithm, which is one of the simplest programming patterns. Your solution requires no branching or looping. Simply write a series of statements that will exec..

  Odd-length cycle in directed graph by linear-time algorithm

Give a linear-time algorithm to find an odd-length cycle in a directed graph. You may NOT assume that the graph is strongly connected.

  Components of computer system interact within system

How do the components of your computer system interact within the system? What improvements or additions to your system do you think would benefit you or make the system more user-friendly? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd