Compose a paper describing your experience writing the


Preventing Security Issues via a Network and Information Security Solution: 
An Analytical Report

In the following sections the details and procedures for each of these tasks is discussed:

Task 1. Research, purchase, and delivery of all equipment and software needed.

Task 2. Installation and configuration of all hardware and software.

After receiving the delivered equipment we immediately began installation.

Task 3. Implementation and monitoring of new network

Task 4. Writing, review, approval, and distribution of network documentation.

Progress report:-

Purpose
This is a progress report on the research done by the Information Security Department on possible vulnerabilities that could be exploited in Hip Hop's-main computer system through the use of a vulnerability assessment.

Task 1. To acquire a baseline of all of the systems that needs to be tested by the White Box Testing to be performed by the Information Security Department Hip Hop socks.

This was an important task to accomplish before performing task two because it gave our department and idea on where to begin our testing. Valuable time was saved because we were not working on something that could not be there. During our baseline systems test, there were several different key machines/systems that we recognized to be top priority.

These top priority systems were:

Task 2: Perform the White box test on the previously known systems.
This task out of the six tasks was the most important to complete accurately. It is a test to see if there is any potential vulnerability that can become exploited by hackers to steal important confidential information. This test would determine if an individual with previous knowledge of our system, aka an insider threat, or an individual who acquired knowledge on our system could try to actually compromise our network.

The main programs that were run to check for possible vulnerabilities are as follows:
• Khali Linux
• BackTrack
• Metasploit
• Nessus
• Nmap

After running all the following programs some initial data is starting to present itself. Some of the information being presented is both good and possibly bad but would require more in depth research to see the exact problems that could occur if the vulnerability were left open to the public.

Future Work
We are currently working with XYZ the outside contractor, to complete a Black Box test. We will then begin Task 4, to analyze all of the found vulnerabilities that could potentially be exposed from both tests.

Task 3: Perform the Black Box Test.

Task 4: Analyze the research and progress that both the White Box and Black Box test found.

Task 5: Research methods to solve any potential vulnerabilities found in the systems.

Task 6: Create a recommendation report for any of the potential vulnerabilities found.

Reflection paper:

Write a reflection paper.

Compose an approximate 750 to 1,000 word paper describing your experience writing the report and developing the presentation. Include these topics in your description:

• Your process of writing the report including determining your audience, analyzing the data, and organizing the information
• Your process of developing your presentation including identifying and organizing your content
• Your reasons for choosing the type of graphic(s) you used and why the graphic(s) are appropriate for the report and presentation

• The following is very important:
• Lessons you have learned from developing these documents
• Ways in which you can apply this experience in your professional, academic, or personal work
• Why this class worked for you or didn't.

Memo:-
Purpose
The purpose of this proposal is to request a study and analyze the implementation and eventual widespread use of a policy that will reduce the threat of a current or former employee divulging sensitive or proprietary company information to a competitor or a current employee accidentally leaking information due to an unintentional data spill.

Tasks
In order to solve the problem, I am proposing that these tasks be completed:

Task 1: Consult case-study data on similar problems found in organizations and annotate how the problem was fixed for that organization.

Task 2: Search online internet resources/library databases for more information on mitigating the insider threat and implementing a solution within an organization.

Task 3: Survey of current and former IT security professionals on ideas for securing protected company information/access to company resources.

Task 4: Research successful companies with comprehensive insider threat policies already implemented.

Schedule: A graph/timeline works well for this

Task 1: Determine the needs of company

Task 2: Research Display Sizes

Task 3: Research XYZ

Task 4: ResearchABC

Task 5: Final Report / Implementation

Attachment:- Assignment.rar

Solution Preview :

Prepared by a verified Expert
Dissertation: Compose a paper describing your experience writing the
Reference No:- TGS02168463

Now Priced at $10 (50% Discount)

Recommended (91%)

Rated (4.3/5)