Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Cyber Threats and Vulnerabilities- guide

Objectives:

(1) Assess the primary cyber threats and vulnerabilities associated with an organization's mission-critical information systems and corrective measures.

(2) Increase hands-on skills and defense strategies by attacking a web application to steal "sensitive" data.

Competencies: Teambuilding skills, Systems thinking, hands-on

Instructions:

(1) Review the entire interactive case study for Jacket-X Corporation (both parts) presented in the Course Content area of the classroom (Click the "Case Studies" link).

Analyzes and reports on the threats and vulnerabilities of the enterprise network for the Jacket-X Corporation and recommend countermeasures to address these threats and vulnerabilities.

(2) A healthcare website has vulnerabilities besides the late delivery. As a group of ethical hackers, your responsibility is to help the organization to secure the web application. The first step for you is to identify the vulnerabilities. Now go to the website to "steal" as much data as you can.

http://vlab02.pneumann.com/patients13/?bill_month=8&sec=HSPO15

(This website is preset for this class only. The data are not real. Do not attempt to attack any public websites.)

1. The target. The target website is setup for this exercise only. It is not a real healthcare website and there is no real data in the system. So students are free to practice.

2. Is the information (url) sufficient? Yes, an ethical hacker usually knows no more than a URL.

3. I have no idea how to "steal" the data. That's why we form a group. Actually it could be very easy to get some data from the website. (Will provide hints later if you couldn't figure out.) Having said that, there are other data in the system that may not be easy to "steal".

4. The goal The goal for this group exercise it to understand vulnerabilities in IT systems and most importantly looking for solutions to secure web applications. Not doing so will lead to data bleaches such as Target and many others.

After finishing the vulnerability assessment, your group needs to provide recommendations as for how to fix the problems.

The deliverable for each team is a written report. The report contains two parts: Jacker-X and Ethical Hacking. The length of this paper should be 10-15 pages double spaced. Page count does include the title page, table of contents, abstract and reference pages. (Note: including the table of contents and abstract are preferred but not required.) The page count DOES NOT include figures and tables.

Prepare your report in Word. Include a minimum of 10 sources. The citations and the reference list in the report should be formatted in accordance with APA 6th edition guidelines.

Before you submit your paper, you will need to run your assignment (part 1, Jacket-X Corporation) through Turnitin.com and receive an originality report. DO NOT WAIT TO THE LAST MINUTE TO DO THIS. It might take several hours to do this. Resubmissions can take a day or more.

After it meets all of the stated criteria, upload the paper and the originality report in the assignment folder.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92063411
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Develop a work breakdown structure for a online retailer to

Develop a work breakdown structure for a Online retailer to include a paragraph about your structure. Include at least three levels in your diagram. Project: Primarily online retailer. The project will require the accoun ...

Research the it security policy used by your university or

Research the IT security policy used by your university or by some other organization you are associated with. Identify which of the topics listed in Section 14.2 this policy addresses. If possible, identify any legal or ...

Hill-rom was transforming from its traditional lines of

Hill-Rom was transforming from its traditional lines of business to a company that was leveraging data to ensure patient safety and satisfaction. 1-How does the HILL-TOM transformation journey change the way the company ...

Q1 explain how managers strive to understand customers

Q1: Explain how managers strive to understand customers' preferences in the Lumpy market for new technologies? Q2: What are the constraints faced by companies as they strive to meet customers' needs in a lumpy market? Ea ...

Technical projects fail when they deliver significantly

Technical projects fail when they deliver significantly late, substantially over budget, and/or with significant features missing or unusable. Sponsors may lose patience and cancel stalled projects. Please respond to the ...

Question a boeing 787 dreamliner if you were the program

Question : a) Boeing 787 Dreamliner. If you were the program manager, what would you have done differentlyto avoid the problems faced by the Dreamliner program? b) Enterprise Architecture at American Express. Why was it ...

Managing services and securitytaskyour job in this

Managing Services and Security Task Your job in this assignment is to create two Virtual machines each running a different but the latest distribution of Linux e.g. Ubuntu Server and CentOS. Each of these VM's is to offe ...

For this assignment research the internet or strayer

For this assignment, research the Internet or Strayer databases for information related to improper assumptions concerning accounting information systems. Write a five to seven (5-7) page paper in which you: Based on you ...

Assignmentsuppose you were recently hired for a new

Assignment Suppose you were recently hired for a new initiative as a business continuity lead / manager at a medium-sized healthcare company. You have been asked to prepare a presentation to the Board of Directors on you ...

You are hired as a chief technology officer cto of a

You are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begin working on the design of the product. As CTO, ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As