Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

Preventing Security Issues via a Network and Information Security Solution: 
An Analytical Report

In the following sections the details and procedures for each of these tasks is discussed:

Task 1. Research, purchase, and delivery of all equipment and software needed.

Task 2. Installation and configuration of all hardware and software.

After receiving the delivered equipment we immediately began installation.

Task 3. Implementation and monitoring of new network

Task 4. Writing, review, approval, and distribution of network documentation.

Progress report:-

Purpose
This is a progress report on the research done by the Information Security Department on possible vulnerabilities that could be exploited in Hip Hop's-main computer system through the use of a vulnerability assessment.

Task 1. To acquire a baseline of all of the systems that needs to be tested by the White Box Testing to be performed by the Information Security Department Hip Hop socks.

This was an important task to accomplish before performing task two because it gave our department and idea on where to begin our testing. Valuable time was saved because we were not working on something that could not be there. During our baseline systems test, there were several different key machines/systems that we recognized to be top priority.

These top priority systems were:

Task 2: Perform the White box test on the previously known systems.
This task out of the six tasks was the most important to complete accurately. It is a test to see if there is any potential vulnerability that can become exploited by hackers to steal important confidential information. This test would determine if an individual with previous knowledge of our system, aka an insider threat, or an individual who acquired knowledge on our system could try to actually compromise our network.

The main programs that were run to check for possible vulnerabilities are as follows:
• Khali Linux
• BackTrack
• Metasploit
• Nessus
• Nmap

After running all the following programs some initial data is starting to present itself. Some of the information being presented is both good and possibly bad but would require more in depth research to see the exact problems that could occur if the vulnerability were left open to the public.

Future Work
We are currently working with XYZ the outside contractor, to complete a Black Box test. We will then begin Task 4, to analyze all of the found vulnerabilities that could potentially be exposed from both tests.

Task 3: Perform the Black Box Test.

Task 4: Analyze the research and progress that both the White Box and Black Box test found.

Task 5: Research methods to solve any potential vulnerabilities found in the systems.

Task 6: Create a recommendation report for any of the potential vulnerabilities found.

Reflection paper:

Write a reflection paper.

Compose an approximate 750 to 1,000 word paper describing your experience writing the report and developing the presentation. Include these topics in your description:

• Your process of writing the report including determining your audience, analyzing the data, and organizing the information
• Your process of developing your presentation including identifying and organizing your content
• Your reasons for choosing the type of graphic(s) you used and why the graphic(s) are appropriate for the report and presentation

• The following is very important:
• Lessons you have learned from developing these documents
• Ways in which you can apply this experience in your professional, academic, or personal work
• Why this class worked for you or didn't.

Memo:-
Purpose
The purpose of this proposal is to request a study and analyze the implementation and eventual widespread use of a policy that will reduce the threat of a current or former employee divulging sensitive or proprietary company information to a competitor or a current employee accidentally leaking information due to an unintentional data spill.

Tasks
In order to solve the problem, I am proposing that these tasks be completed:

Task 1: Consult case-study data on similar problems found in organizations and annotate how the problem was fixed for that organization.

Task 2: Search online internet resources/library databases for more information on mitigating the insider threat and implementing a solution within an organization.

Task 3: Survey of current and former IT security professionals on ideas for securing protected company information/access to company resources.

Task 4: Research successful companies with comprehensive insider threat policies already implemented.

Schedule: A graph/timeline works well for this

Task 1: Determine the needs of company

Task 2: Research Display Sizes

Task 3: Research XYZ

Task 4: ResearchABC

Task 5: Final Report / Implementation

Attachment:- Assignment.rar

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M92181634
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Homework Help/Study Tips

Question please separate each unit from each other and

Question: Please separate each unit from each other and provide individual references and void plagiarism UNIT 1 1. What is the difference between research- and evidence-based practice projects? Provide an example of eac ...

Question please provide an answer of at least 100-300

Question: Please provide an answer of at least 100-300 words. How is the value of a nation's currency determined? Is there such a thing as its "true" value? Should a government try to influence the value of its currency? ...

Overviewyou are required to modify and logically extend

Overview You are required to modify and logically extend the functionality of a provided code base to implement a game. This requires you to modify the code base as well as create documentation and implement various user ...

Question write a four to five 4-5 page paper in which

Question: Write a four to five (4-5) page paper in which you: 1. Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how ...

Identifying your learning patternsyou may view a written

Identifying Your Learning Patterns You may view a written transcriptDescription: Preview the document of this video or click the "CC" button on the video player above. Prepare: Before attempting this discussion, be sure ...

Assignment 2 required assignment 1-strategic alliances and

Assignment 2: Required Assignment 1-Strategic Alliances and Human Resource Management Background: LGE is one of the leading global companies in the industry. It is composed of five divisions: air conditioning, business s ...

Question interview two helping service professionals from

Question: Interview two helping service professionals from two different settings, such as a school, hospital, or prison. Ensure that at least one of the interviewees is a clinical psychologist. Provide the name and work ...

Assignment 2 global staffingevery company finds it

Assignment 2: Global Staffing Every company finds it challenging to recruit and select top executives for an international location. The nationals of the host country will be aware of the local laws and customs and may a ...

Question confidentialitya counselor has been treating a

Question: Confidentiality A counselor has been treating a client, Jay, who was recently in a bad accident that left him bedridden and partially paralyzed. With sustained physiotherapy and medication, the paralytic effect ...

Question scenario health systems daniel a dnp prepared ed

Question: Scenario: Health Systems: Daniel, a DNP prepared ED NP identified that patients seen in the ED for various reasons had undiagnosed HTN. He observed that the patient's chief compliant was well addressed but the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As