Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Executive Proposal Project

The purpose of this project is to evaluate the student's ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal.

Project Deliverable                                  

  • Using the Case Study presented in this document, to complete an executive proposal.
  • Provide a threeto five page proposal summarizing purpose and benefit of chosen security software to the executive management team.
  • The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats.
  • The proposal should effectively describe the software in a manner that will allow the executiveteam members to understand the purpose and benefits of the software to approve purchase.

Guidelines

  • Evaluate and select a security tool for recommendation that you learned about in theiLabs modules or the EC-Council text books.
  • The proposal document must be 3 to 5 pages long, conforming to APA standards. See "Writing Resources" in the online classroom where you'll find help on writing for research projects.
  • At least threeauthoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References."
  • Appropriate citations are required. See the syllabus regarding plagiarism policies.
  • This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity.
  • The paper is due during Week 7 of this course.

Project Description

The purpose of project is to write an executive proposal for a fictitious company called Medical Solutions Systems. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company's corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits.

Suggested Approach

  1. Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook.
  2. Determine whether the tool would be beneficial in testing the security of a corporate network.
  3. Use the vendor's website to collect necessary information about the tool to be able to explain its purpose and benefit.
  4. Include 3rd party endorsements and case studies about the tool.
  5. Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab.

Company Description

Medical Solutions Systems

Medical Solutions Systemsis a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Medical Solutions Systemsis on its way to becoming a major player in the medical research and development industry. However, due to its success, Medical Solutions Systemshas also become a major target of cybercriminals. Medical Solutions Systemshas been the victim of cybercriminal attempts to steal intellectual property and sell it to Medical Solutions Systems' competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2013, Medical Solutions Systemswas falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Medical Solutions Systems' public website and several Denial of Service attacks at different times over a 9 month period that brought the corporate network to its knees. These attacks had a major impact on Medical Solutions Systems' ability to conduct business and resulted in undesirable publicity for the company.

Regardless of its security problems,Medical Solutions Systemshas continued to grow as a company. Its research and development departments have grown over the years, due to the expansion of the company, in proportion to the increase in its business making up over 40% of the human resources. Medical Solutions Systems' innovative research and development information is paramount to its continued success as a company. Although, no known attacks have occurred in last 18 months, the security of its network and intellectual property is still a major concern for the company. Because Medical Solutions Systemsis a still fairly young company, management has been hesitant to budget for expensive security projects. However, this point of view is beginning to change. Particularly, because one of Medical Solutions Systems'competitors, a major player in the medical research and development industry for over 40 years, experienced a loss of hundreds of millions of dollars in research data that was stolen from its corporate network by cyberthieves.

Background and your role

You are the IT Manager hired in 2015 to manage the physical and operational security of Medical Solutions Systems'corporate information system.You understand information security issues better than anyone else in the company. You also know that the network is vulnerable to outside threats because it has experienced attacks in the past and because you haven't had the resources to properly test the corporate information system to identify the vulnerabilities that might exist and take action prevent possible attacks. You have a responsibility to bring these concerns to the attention of the executive team and ask for approval to purchase the necessary testing software.

Your education and training have introduced you to variety of security tools for testing computer and network security. The majority of these tools you either only read about or have practiced using in lab environment. You have decided to research some of these tools and test them out in your own lab environment and choose one for recommendation to executive team.

You will need to present information that proves the chosen tool will be beneficial to the security of corporate information system. To accomplish this you will need to research the product, if possible, test the product in a virtual lab environment. If the tool is part of your iLab exercise, it is recommended that you practice using and testing the tool beyond the scope of the lab exercise. Based on your research and analysis, you will include this information in your proposal in way that the executive staff can understand and allowing them to make an informed decision to approve purchase of the product.

The executive management team of Medical Solutions Systems:

338_executive management team of Medical Solutions Systems.png

The proposal should include:

  • Detailed description of the software and benefits.
  • Include reviews, case studies and customer recommendations
  • Include your own hands-on experience with the tool and test results
  • Cost of product. Include additional costs such as training or hardware software that might be needed in order to properly deploy manage and maintain the software.
  • How will the software impact the production environment? For example, the software may test for Denial of Service attacks. You need to explain any interruptions the test may have on business operations. You need to justify the need for such a test. Also explain how to you plan to minimize or prevent possible production outages.

The software should test for one or more of the following types of attacks:

  • Denial of Service (DoS)
  • Cross Site Scripting (XSS)
  • Authentication Bypass
  • Directory Traversal
  • Session Management
  • SQL injection
  • Database Attacks
  • Password Attacks
  • Firewall/Router Attacks
  • Operating System Attacks

Corporate Office Network Topology

The Medical Solutions Systemsmain research and development facility is located in Reston Virginia. You have concerns about the sensitive information that is stored at this location as well as data that transmitted over the WAN to Medical Solutions Systems'New York City headquarters location, business partners and clients. The Reston facility is also where the Medical Solutions Systemsdata center is located. The data center is where Medical Solutions Systems'public website, email, databases and corporate intranet are hosted. The environment contains a mix of Microsoft and *NIX technologies.

  • 45 Windows 2012 Servers
  • 13 Windows 2008 Servers
  • 15 UNIX Servers
  • 2200 Windows 8 Desktops
  • Web Servers: Apache and IIS
  • Services: FTP, SMTP, DNS, DHCP, VPN
  • Database: SQL, Oracle and MySQL
  • Network: Cisco Routers and Firewalls

772_Corporate Office Network Topology.png

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92564841
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Given an undirected graph with both positive and negative

Given an undirected graph with both positive and negative edge weights, design an algorithm to find a maximum spanning forest with the largest total edge weights.

Question a simm has a capacity of 32mx64how many 32mx8

Question : A SIMM has a capacity of 32Mx64. How many 32Mx8 DRAMa are reqquired to make this SIMM? How many address lines does the SIMM require? How should the DRAMs Be connected ?

Question you recently have been hired as the director of

Question: You recently have been hired as the Director of Systems Administration operations for ViralMedia, a provider of software tools for graphics artists. The company's core product, DigiWorld, runs under Windows and ...

Under the trade model with external economies of scale is

Under the trade model with external economies of scale, is it possible for a country to be worse off with trade than it would have been without trade? Justify your answer.

The switch statementhere is the question in its entirety

The switch statement Here is the question in its entirety, but the actual problem is at the end. I just felt that I would give an overview of what I am asking. The program has to be in c++ (.cpp) and must compile as such ...

Dog up franks is looking at a new sausage system with an

Dog Up! Franks is looking at a new sausage system with an initial cost of $440,000 that will last for five years. The fixed asset will qualify for 100 percent bonus depreciation in the first year, at the end of which the ...

In a standard s - t maximum flow problem we assume edges

In a standard s - t maximum flow problem, we assume edges have capacities, and there is no limit on how much flow is allowed to flow through a node. In this problem, we consider the variant of the maximum flow and minimu ...

Stack implemented with slldesign and code your own lifo

Stack implemented with SLL Design and code your own LIFO Stack using single liked list to hold a list of integers. Use the C++ "struct" structure to create your SLL nodes. Node position numbering should start with one. Y ...

In thenbspworkspaceproject-lognbspdirectory create file

In the ~/workspace/project-log directory, create file named  changelog.txt  with the following content and format: Changelog Version: 1.0 Redirect the output of the ls command to a file named  file-list.txt  in the ~/wor ...

Based on land minerals and natural resources labor and

Based on land, minerals and natural resources, labor and entrepreneurial innovation, which country do you feel has the greatest long-term potential China or Russia.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As