Ask Homework Help/Study Tips Expert

Preventing Security Issues via a Network and Information Security Solution: 
An Analytical Report

In the following sections the details and procedures for each of these tasks is discussed:

Task 1. Research, purchase, and delivery of all equipment and software needed.

Task 2. Installation and configuration of all hardware and software.

After receiving the delivered equipment we immediately began installation.

Task 3. Implementation and monitoring of new network

Task 4. Writing, review, approval, and distribution of network documentation.

Progress report:-

Purpose
This is a progress report on the research done by the Information Security Department on possible vulnerabilities that could be exploited in Hip Hop's-main computer system through the use of a vulnerability assessment.

Task 1. To acquire a baseline of all of the systems that needs to be tested by the White Box Testing to be performed by the Information Security Department Hip Hop socks.

This was an important task to accomplish before performing task two because it gave our department and idea on where to begin our testing. Valuable time was saved because we were not working on something that could not be there. During our baseline systems test, there were several different key machines/systems that we recognized to be top priority.

These top priority systems were:

Task 2: Perform the White box test on the previously known systems.
This task out of the six tasks was the most important to complete accurately. It is a test to see if there is any potential vulnerability that can become exploited by hackers to steal important confidential information. This test would determine if an individual with previous knowledge of our system, aka an insider threat, or an individual who acquired knowledge on our system could try to actually compromise our network.

The main programs that were run to check for possible vulnerabilities are as follows:
• Khali Linux
• BackTrack
• Metasploit
• Nessus
• Nmap

After running all the following programs some initial data is starting to present itself. Some of the information being presented is both good and possibly bad but would require more in depth research to see the exact problems that could occur if the vulnerability were left open to the public.

Future Work
We are currently working with XYZ the outside contractor, to complete a Black Box test. We will then begin Task 4, to analyze all of the found vulnerabilities that could potentially be exposed from both tests.

Task 3: Perform the Black Box Test.

Task 4: Analyze the research and progress that both the White Box and Black Box test found.

Task 5: Research methods to solve any potential vulnerabilities found in the systems.

Task 6: Create a recommendation report for any of the potential vulnerabilities found.

Reflection paper:

Write a reflection paper.

Compose an approximate 750 to 1,000 word paper describing your experience writing the report and developing the presentation. Include these topics in your description:

• Your process of writing the report including determining your audience, analyzing the data, and organizing the information
• Your process of developing your presentation including identifying and organizing your content
• Your reasons for choosing the type of graphic(s) you used and why the graphic(s) are appropriate for the report and presentation

• The following is very important:
• Lessons you have learned from developing these documents
• Ways in which you can apply this experience in your professional, academic, or personal work
• Why this class worked for you or didn't.

Memo:-
Purpose
The purpose of this proposal is to request a study and analyze the implementation and eventual widespread use of a policy that will reduce the threat of a current or former employee divulging sensitive or proprietary company information to a competitor or a current employee accidentally leaking information due to an unintentional data spill.

Tasks
In order to solve the problem, I am proposing that these tasks be completed:

Task 1: Consult case-study data on similar problems found in organizations and annotate how the problem was fixed for that organization.

Task 2: Search online internet resources/library databases for more information on mitigating the insider threat and implementing a solution within an organization.

Task 3: Survey of current and former IT security professionals on ideas for securing protected company information/access to company resources.

Task 4: Research successful companies with comprehensive insider threat policies already implemented.

Schedule: A graph/timeline works well for this

Task 1: Determine the needs of company

Task 2: Research Display Sizes

Task 3: Research XYZ

Task 4: ResearchABC

Task 5: Final Report / Implementation

Attachment:- Assignment.rar

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M92181634
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Homework Help/Study Tips

Review the website airmail service from the smithsonian

Review the website Airmail Service from the Smithsonian National Postal Museum that is dedicated to the history of the U.S. Air Mail Service. Go to the Airmail in America link and explore the additional tabs along the le ...

Read the article frank whittle and the race for the jet

Read the article Frank Whittle and the Race for the Jet from "Historynet" describing the historical influences of Sir Frank Whittle and his early work contributions to jet engine technologies. Prepare a presentation high ...

Overviewnow that we have had an introduction to the context

Overview Now that we have had an introduction to the context of Jesus' life and an overview of the Biblical gospels, we are now ready to take a look at the earliest gospel written about Jesus - the Gospel of Mark. In thi ...

Fitness projectstudents will design and implement a six

Fitness Project Students will design and implement a six week long fitness program for a family member, friend or co-worker. The fitness program will be based on concepts discussed in class. Students will provide justifi ...

Read grand canyon collision - the greatest commercial air

Read Grand Canyon Collision - The greatest commercial air tragedy of its day! from doney, which details the circumstances surrounding one of the most prolific aircraft accidents of all time-the June 1956 mid-air collisio ...

Qestion anti-trustprior to completing the assignment

Question: Anti-Trust Prior to completing the assignment, review Chapter 4 of your course text. You are a manager with 5 years of experience and need to write a report for senior management on how your firm can avoid the ...

Question how has the patient and affordable care act of

Question: How has the Patient and Affordable Care Act of 2010 (the "Health Care Reform Act") reshaped financial arrangements between hospitals, physicians, and other providers with Medicare making a single payment for al ...

Plate tectonicsthe learning objectives for chapter 2 and

Plate Tectonics The Learning Objectives for Chapter 2 and this web quest is to learn about and become familiar with: Plate Boundary Types Plate Boundary Interactions Plate Tectonic Map of the World Past Plate Movement an ...

Question critical case for billing amp codingcomplete the

Question: Critical Case for Billing & Coding Complete the Critical Case for Billing & Coding simulation within the LearnScape platform. You will need to create a single Microsoft Word file and save it to your computer. A ...

Review the cba provided in the resources section between

Review the CBA provided in the resources section between the Trustees of Columbia University and Local 2110 International Union of Technical, Office, and Professional Workers. Describe how this is similar to a "contract" ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As