Web servers containing customer portals

Assignment Help Basic Computer Science
Reference no: EM13762316

As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business's IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too "flat." During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan.
Non-stateful packet firewall separates the business's internal network from its DMZ.

All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN.

All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one.

Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5.

One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM.

Reference no: EM13762316

Questions Cloud

The future of the nature of our society''s drug : Finally, given the way in which many forces have affected drug use in the past, develop your own projection twenty-five years into the future of the nature of our society's drug use problems, based on some of the social, political, economic, law enfo..
Examine how language is a form of social action : Examine how language is a form of social action that varies cross- and intra-culturally to explain power and other social differentials.
Content-related role of commercial web sites : Which of the following is NOT a content-related role of commercial Web sites?
An imaginary quantitative nursing : The independent and dependent variable, and state the research hypothesis for your study. The variables must be categorical variables.
Web servers containing customer portals : All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO, President, etc.) and the Help Desk are not on that LAN; they are connected ..
What is the value of the marginal propensity to consume : What is the value of the marginal propensity to consume and what is consumption at an output of $1,000 billion?
Sole promotional tool : Question 1: Why would the manufacturer of a $390 video home security system be reluctant to use advertising as its sole promotional tool?
Fi and rri notation illustrate : Using the Fi and RRi notation illustrate the transfer of 15 data packets with a window size of 5.
Demand for labor is said to be a derived demand : The demand for labor is said to be a "derived" demand. What is the meaning of a derived demand? How does this concept help to determine the demand for labor?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Why information security is not factor for organization

But would not require to give for information security on those systems. Explain that environment and desribe why information security is not factor for that organization.

  Problem related to resume

two attached files one is details what need to write and other file is resume.

  Show your work for the reduction

Find the complement of F(A,B,C) = AB + ( BC' * A) and reduce it. show your work for the reduction using the axioms of boolean algebra. then, implement the simplified expression using AND,OR and NOT gates

  Identity using a combinatorial proof

Identity using a combinatorial proof

  Explain the five activities of systems analysis

In a one-page paper: explain the five activities of systems analysis and offer any additional activities you feel should be added (from your reading or experience).

  The medical biller

A physician has treated a patient who has a diagnosis that is not listed on the superbill. How is this handled by the physician? The medical biller?

  Write a c program that implements a shell

Write a C program that implements a shell.

  K-map to simplify output function using don-t care

Use K-map to simplify output function of x by don't care conditions.

  What continuing education is required for the holder

what continuing education is required for the holder of a CISSP to remain current and in good standing.

  Write a program that reads a value

Write a program that reads a value (say n) from the user and ouputs "Hello world" n times. Verify that the user has entered an integer. If the input is 3, the output will be "hello world" 3 times.

  Problems of understanding natural languages

Briefly discussed the problems of understanding natural languages as opposed to formal programming languages and describe how the problem of traveling from one city to another could be framed as a production system. What are the states? What are the..

  Write the definition of a class counter containing

Write the definition of a class Counter containing: An instance variable named counter of type int An instance variable named limit of type int . A constructor that takes two int arguments and assigns the first one to counter and the s..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd