SlideShare a Scribd company logo
1 of 9
CMIT 321 Executive Proposal Project
The purpose of this project is to evaluate the student’s ability to
research and evaluate security testing software and present a
proposal for review by executive team members. By completing
the document the student will also gain practical knowledge of
the security evaluation documentation and proposal writing
process. The project will enable the student to identify and
understand the required standards in practice, as well as the
details that should be covered within a proposal.
Project Deliverable
·
Using the Case Study presented in this document, to complete
an executive proposal.
·
Provide a three to five page proposal summarizing purpose and
benefit of chosen security software to the executive
management team.
·
The student will evaluate and test security testing software for
purposes of testing corporate network security. The purpose of
the software is to measure the security posture of the
organization by identifying vulnerabilities and help prevent
future attacks and deter any real-time unknown threats.
·
The proposal should effectively describe the software in a
manner that will allow the executive team members to
understand the purpose and benefits of the software to approve
purchase.
Guidelines
·
Evaluate and select a security tool for recommendation that you
learned about in the iLabs modules or the EC-Council text
books.
·
The proposal document must be 3 to 5 pages long, conforming
to APA standards. See "Writing Guideline" in WebTycho where
you'll find help on writing for research projects.
·
At least three authoritative, outside references are required
(anonymous authors or web pages are not acceptable). These
should be listed on the last page titled "References."
·
Appropriate citations are required. See the syllabus regarding
plagiarism policies.
·
This will be graded on quality of research topic, quality of
paper information, use of citations, grammar and sentence
structure, and creativity.
·
The paper is due during Week 7 of this course.
Project Description
The purpose of project is to write an executive proposal for a
fictitious company called Advanced Research. The goal of the
proposal is to persuade the executive management team to
approve purchase of security testing software that can benefit
the company’s corporate network security by testing and
identifying vulnerabilities before they are exploited by hackers.
The proposal must include a detailed description of the
software, its purpose and benefits.
Suggested Approach
Research a security testing software tool that you practiced
using in the EC-Council iLabs or from the textbook.
Determine whether the tool would be beneficial in testing the
security of a corporate network.
Use the vendor’s website to collect necessary information about
the tool to be able to explain its purpose and benefit.
Include 3
rd
party endorsements and case studies about the tool.
Integrate the information from your own experience with the
tool into your proposal. This may include results from the iLab
exercises or your own test lab.
Company Description
Advanced Research Corporation
Advanced Research is a startup medical research and
development company. After five years of extraordinary success
in the development of innovative medical and pharmaceutical
products, Advanced Research is on its way to becoming a major
player in the medical research and development industry.
However, due to its success, Advanced Research has also
become a major target of cybercriminals. Advanced Research
has been the victim of cybercriminal attempts to steal
intellectual property and sell it to Advanced Research’s
competitors. It is suspected that the corporate network has been
infiltrated from unauthorized sources more than once. In 2011,
Advanced Research was falsely accused of unethical research
and development practices. The false allegations resulted in the
defacement of Advanced Research’s public website and several
Denial of Service attacks at different times over a 9 month
period that brought the corporate network to its knees. These
attacks had a major impact on Advanced Research’s ability to
conduct business and resulted in undesirable publicity for the
company.
Regardless of its security problems, Advanced Research has
continued to grow as a company. Its
research and development departments have grown over the
years, due to the expansion of the company, in proportion to the
increase in its business making up over 40% of the human
resources. Advanced Research’s innovative research and
development information is paramount to its continued success
as a company. Although, no known attacks have occurred in last
18 months, the security of its network and intellectual property
is still a major concern for the company. Because Advanced
Research is a still fairly young company, management has been
hesitant to budget for expensive security projects. However, this
point of view is beginning to change. Particularly, because one
of Advanced Research’s competitors, a major player in the
medical research and development industry for over 40 years,
experienced a loss of hundreds of millions of dollars in research
data that was stolen from its corporate network by cyber
thieves.
Background and your role
You are the IT Manager hired in 2012 to manage the physical
and operational security of Advanced Research’s corporate
information system.
You understand information security issues better than anyone
else in the company. You also know that the network is
vulnerable to outside threats because it has experienced attacks
in the past and because you haven’t had the resources to
properly test the corporate information system to identify the
vulnerabilities that might exist and take action prevent possible
attacks. You have a responsibility to bring these concerns to the
attention of the executive team and ask for approval to purchase
the necessary testing software.
Your education and training have introduced you to variety of
security tools for testing computer and network security. The
majority of these tools you either only read about or have
practiced using in lab environment. You have decided to
research some of these tools and test them out in your own lab
environment and choose one for recommendation to executive
team.
You will need to present information that proves the chosen tool
will be beneficial to the security of corporate information
system. To accomplish this you will need to research the
product, if possible, test the product in a virtual lab
environment. If the tool is part of your iLab exercise, it is
recommended that you practice using and testing the tool
beyond the scope of the lab exercise. Based on your research
and analysis, you will include this information in your proposal
in way that the executive staff can understand and allowing
them to make an informed decision to approve purchase of the
product.
The executive management team of Advanced Research:
The proposal should include:
·
Detailed description of the software and benefits.
·
Include reviews, case studies and customer recommendations
·
Include your own hands-on experience with the tool and test
results
·
Cost of product. Include additional costs such as training or
hardware software that might be needed in order to properly
deploy manage and maintain the software.
·
How will the software impact the production environment? For
example, the software may test for Denial of Service attacks.
You need to explain any interruptions the test may have on
business operations. You need to justify the need for such a
test. Also explain how to you plan to minimize or prevent
possible production outages.
The software should test for one or more of the following types
of attacks:
·
Denial of Service (DoS)
·
Cross Site Scripting (XSS)
·
Authentication Bypass
·
Directory Traversal
·
Session Management
·
SQL injection
·
Database Attacks
·
Password Attacks
·
Firewall/Router Attacks
·
Operating System Attacks
Corporate Office Network Topology
The Advanced Research main research and development facility
is located in Reston Virginia. You have concerns about the
sensitive information that is stored at this location as well as
data that transmitted over the WAN to Advanced Research’s
New York City headquarters location, business partners and
clients. The Reston facility is also where the Advanced
Research data center is located. The data center is where
Advanced Research’s public website, email, databases and
corporate intranet are hosted. The environment contains a mix
of Microsoft and *NIX technologies.
·
45 Windows 2008 Servers
·
13 Windows 2003 Servers
·
15 UNIX Servers
·
2200 Windows XP and 7 Desktops
·
Web Servers: Apache and IIS
·
Services: FTP, SMTP, DNS, DHCP, VPN
·
Database: SQL, Oracle and MySQL
·
Network: Cisco Routers and Firewalls
Grading Rubrics
Final Deliverable
Category
Points
%
Description
Documentation and Formatting
10
10%
Appropriate APA citations/referenced sources and formats of
characters/content.
Software Research
20
20%
Accurate Completion of Software Research
Software Analysis
20
20%
Accurate Completion of Software Analysis
Executive Proposal
50
50%
Provide proposal for purchase
Total
100
100%
A quality paper will meet or exceed all of the above
requirements.
CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx

More Related Content

Similar to CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx

Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals211 Check
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxjeanettehully
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured WorldJennifer Mary
 
Education & Training39SecurityMagazine.com SECURITY JU
Education & Training39SecurityMagazine.com  SECURITY  JUEducation & Training39SecurityMagazine.com  SECURITY  JU
Education & Training39SecurityMagazine.com SECURITY JUEvonCanales257
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfAmeliaJonas2
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxAfour tech
 
Running Head LAB 51LAB 57Lab 5.docx
Running Head  LAB 51LAB 57Lab 5.docxRunning Head  LAB 51LAB 57Lab 5.docx
Running Head LAB 51LAB 57Lab 5.docxtoddr4
 
College of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docxCollege of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docxmccormicknadine86
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
Selling Infosec to the CSuite
Selling Infosec to the CSuiteSelling Infosec to the CSuite
Selling Infosec to the CSuiteDave R. Taylor
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxbkbk37
 

Similar to CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx (20)

Penetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Education & Training39SecurityMagazine.com SECURITY JU
Education & Training39SecurityMagazine.com  SECURITY  JUEducation & Training39SecurityMagazine.com  SECURITY  JU
Education & Training39SecurityMagazine.com SECURITY JU
 
Information Security
Information SecurityInformation Security
Information Security
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Security Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdfSecurity Testing Approach for Web Application Testing.pdf
Security Testing Approach for Web Application Testing.pdf
 
Best Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docxBest Practices, Types, and Tools for Security Testing in 2023.docx
Best Practices, Types, and Tools for Security Testing in 2023.docx
 
Penetration Testing Guide
Penetration Testing GuidePenetration Testing Guide
Penetration Testing Guide
 
Running Head LAB 51LAB 57Lab 5.docx
Running Head  LAB 51LAB 57Lab 5.docxRunning Head  LAB 51LAB 57Lab 5.docx
Running Head LAB 51LAB 57Lab 5.docx
 
College of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docxCollege of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docx
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
Selling Infosec to the CSuite
Selling Infosec to the CSuiteSelling Infosec to the CSuite
Selling Infosec to the CSuite
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 

More from fathwaitewalter

Write a 5-paragraph Argumentative Essay on your chosen controversial.docx
Write a 5-paragraph Argumentative Essay on your chosen controversial.docxWrite a 5-paragraph Argumentative Essay on your chosen controversial.docx
Write a 5-paragraph Argumentative Essay on your chosen controversial.docxfathwaitewalter
 
write a 5-7 page paper using APA standards for citation of sources t.docx
write a 5-7 page paper using APA standards for citation of sources t.docxwrite a 5-7 page paper using APA standards for citation of sources t.docx
write a 5-7 page paper using APA standards for citation of sources t.docxfathwaitewalter
 
Write a 4-page proposal that addresses the followingWorking title.docx
Write a 4-page proposal that addresses the followingWorking title.docxWrite a 4-page proposal that addresses the followingWorking title.docx
Write a 4-page proposal that addresses the followingWorking title.docxfathwaitewalter
 
Write a 350- to 700-word summary.Include the following in yo.docx
Write a 350- to 700-word summary.Include the following in yo.docxWrite a 350- to 700-word summary.Include the following in yo.docx
Write a 350- to 700-word summary.Include the following in yo.docxfathwaitewalter
 
write a 5 paged essayBody is 5 pg, 12 pt, double spaced Times .docx
write a 5 paged essayBody is 5 pg, 12 pt, double spaced Times .docxwrite a 5 paged essayBody is 5 pg, 12 pt, double spaced Times .docx
write a 5 paged essayBody is 5 pg, 12 pt, double spaced Times .docxfathwaitewalter
 
Write a 4-5 page feminist critique of a contemporary mainstream fi.docx
Write a 4-5 page feminist critique of a contemporary mainstream fi.docxWrite a 4-5 page feminist critique of a contemporary mainstream fi.docx
Write a 4-5 page feminist critique of a contemporary mainstream fi.docxfathwaitewalter
 
Write a 4 and Half page report (Microsoft Word).What are the m.docx
Write a 4 and Half page report (Microsoft Word).What are the m.docxWrite a 4 and Half page report (Microsoft Word).What are the m.docx
Write a 4 and Half page report (Microsoft Word).What are the m.docxfathwaitewalter
 
Write a 3-4 pages Word document paper that explains the following to.docx
Write a 3-4 pages Word document paper that explains the following to.docxWrite a 3-4 pages Word document paper that explains the following to.docx
Write a 3-4 pages Word document paper that explains the following to.docxfathwaitewalter
 
Write a 3-4 page paper; APA format; minimum of 3 referencesTh.docx
Write a 3-4 page paper; APA format; minimum of 3 referencesTh.docxWrite a 3-4 page paper; APA format; minimum of 3 referencesTh.docx
Write a 3-4 page paper; APA format; minimum of 3 referencesTh.docxfathwaitewalter
 
Write a 3-4 page Team report using APA style that1) Identifies an.docx
Write a 3-4 page Team report using APA style that1) Identifies an.docxWrite a 3-4 page Team report using APA style that1) Identifies an.docx
Write a 3-4 page Team report using APA style that1) Identifies an.docxfathwaitewalter
 
Write a 5-page essay about two readings. Two essays are The made-t.docx
Write a 5-page essay about two readings. Two essays are  The made-t.docxWrite a 5-page essay about two readings. Two essays are  The made-t.docx
Write a 5-page essay about two readings. Two essays are The made-t.docxfathwaitewalter
 
Complete Part I, then revise the sentences in Part II so that their .docx
Complete Part I, then revise the sentences in Part II so that their .docxComplete Part I, then revise the sentences in Part II so that their .docx
Complete Part I, then revise the sentences in Part II so that their .docxfathwaitewalter
 
Complete OutlinePlease include the following1)Title2.docx
Complete OutlinePlease include the following1)Title2.docxComplete OutlinePlease include the following1)Title2.docx
Complete OutlinePlease include the following1)Title2.docxfathwaitewalter
 
Complete Appendix B by writing a paragraph explaining your fictional.docx
Complete Appendix B by writing a paragraph explaining your fictional.docxComplete Appendix B by writing a paragraph explaining your fictional.docx
Complete Appendix B by writing a paragraph explaining your fictional.docxfathwaitewalter
 
Complete an 8- to 10-slide Microsoft® PowerPoint® presentation. Bo.docx
Complete an 8- to 10-slide Microsoft® PowerPoint® presentation. Bo.docxComplete an 8- to 10-slide Microsoft® PowerPoint® presentation. Bo.docx
Complete an 8- to 10-slide Microsoft® PowerPoint® presentation. Bo.docxfathwaitewalter
 
Complete Action Research Activity 4.1 (Textbook Analysis) on page 12.docx
Complete Action Research Activity 4.1 (Textbook Analysis) on page 12.docxComplete Action Research Activity 4.1 (Textbook Analysis) on page 12.docx
Complete Action Research Activity 4.1 (Textbook Analysis) on page 12.docxfathwaitewalter
 
Complete Akron Childrens Hospital Case. Answer the fo.docx
Complete Akron Childrens Hospital Case. Answer the fo.docxComplete Akron Childrens Hospital Case. Answer the fo.docx
Complete Akron Childrens Hospital Case. Answer the fo.docxfathwaitewalter
 
Complete Action Research Activity 4.1 (Textbook Analysis) on pag.docx
Complete Action Research Activity 4.1 (Textbook Analysis) on pag.docxComplete Action Research Activity 4.1 (Textbook Analysis) on pag.docx
Complete Action Research Activity 4.1 (Textbook Analysis) on pag.docxfathwaitewalter
 
CompletarProvide the correct present participle for each verb..docx
CompletarProvide the correct present participle for each verb..docxCompletarProvide the correct present participle for each verb..docx
CompletarProvide the correct present participle for each verb..docxfathwaitewalter
 
Complete both parts of this assignment and submit as a s.docx
Complete both parts of this assignment and submit as a s.docxComplete both parts of this assignment and submit as a s.docx
Complete both parts of this assignment and submit as a s.docxfathwaitewalter
 

More from fathwaitewalter (20)

Write a 5-paragraph Argumentative Essay on your chosen controversial.docx
Write a 5-paragraph Argumentative Essay on your chosen controversial.docxWrite a 5-paragraph Argumentative Essay on your chosen controversial.docx
Write a 5-paragraph Argumentative Essay on your chosen controversial.docx
 
write a 5-7 page paper using APA standards for citation of sources t.docx
write a 5-7 page paper using APA standards for citation of sources t.docxwrite a 5-7 page paper using APA standards for citation of sources t.docx
write a 5-7 page paper using APA standards for citation of sources t.docx
 
Write a 4-page proposal that addresses the followingWorking title.docx
Write a 4-page proposal that addresses the followingWorking title.docxWrite a 4-page proposal that addresses the followingWorking title.docx
Write a 4-page proposal that addresses the followingWorking title.docx
 
Write a 350- to 700-word summary.Include the following in yo.docx
Write a 350- to 700-word summary.Include the following in yo.docxWrite a 350- to 700-word summary.Include the following in yo.docx
Write a 350- to 700-word summary.Include the following in yo.docx
 
write a 5 paged essayBody is 5 pg, 12 pt, double spaced Times .docx
write a 5 paged essayBody is 5 pg, 12 pt, double spaced Times .docxwrite a 5 paged essayBody is 5 pg, 12 pt, double spaced Times .docx
write a 5 paged essayBody is 5 pg, 12 pt, double spaced Times .docx
 
Write a 4-5 page feminist critique of a contemporary mainstream fi.docx
Write a 4-5 page feminist critique of a contemporary mainstream fi.docxWrite a 4-5 page feminist critique of a contemporary mainstream fi.docx
Write a 4-5 page feminist critique of a contemporary mainstream fi.docx
 
Write a 4 and Half page report (Microsoft Word).What are the m.docx
Write a 4 and Half page report (Microsoft Word).What are the m.docxWrite a 4 and Half page report (Microsoft Word).What are the m.docx
Write a 4 and Half page report (Microsoft Word).What are the m.docx
 
Write a 3-4 pages Word document paper that explains the following to.docx
Write a 3-4 pages Word document paper that explains the following to.docxWrite a 3-4 pages Word document paper that explains the following to.docx
Write a 3-4 pages Word document paper that explains the following to.docx
 
Write a 3-4 page paper; APA format; minimum of 3 referencesTh.docx
Write a 3-4 page paper; APA format; minimum of 3 referencesTh.docxWrite a 3-4 page paper; APA format; minimum of 3 referencesTh.docx
Write a 3-4 page paper; APA format; minimum of 3 referencesTh.docx
 
Write a 3-4 page Team report using APA style that1) Identifies an.docx
Write a 3-4 page Team report using APA style that1) Identifies an.docxWrite a 3-4 page Team report using APA style that1) Identifies an.docx
Write a 3-4 page Team report using APA style that1) Identifies an.docx
 
Write a 5-page essay about two readings. Two essays are The made-t.docx
Write a 5-page essay about two readings. Two essays are  The made-t.docxWrite a 5-page essay about two readings. Two essays are  The made-t.docx
Write a 5-page essay about two readings. Two essays are The made-t.docx
 
Complete Part I, then revise the sentences in Part II so that their .docx
Complete Part I, then revise the sentences in Part II so that their .docxComplete Part I, then revise the sentences in Part II so that their .docx
Complete Part I, then revise the sentences in Part II so that their .docx
 
Complete OutlinePlease include the following1)Title2.docx
Complete OutlinePlease include the following1)Title2.docxComplete OutlinePlease include the following1)Title2.docx
Complete OutlinePlease include the following1)Title2.docx
 
Complete Appendix B by writing a paragraph explaining your fictional.docx
Complete Appendix B by writing a paragraph explaining your fictional.docxComplete Appendix B by writing a paragraph explaining your fictional.docx
Complete Appendix B by writing a paragraph explaining your fictional.docx
 
Complete an 8- to 10-slide Microsoft® PowerPoint® presentation. Bo.docx
Complete an 8- to 10-slide Microsoft® PowerPoint® presentation. Bo.docxComplete an 8- to 10-slide Microsoft® PowerPoint® presentation. Bo.docx
Complete an 8- to 10-slide Microsoft® PowerPoint® presentation. Bo.docx
 
Complete Action Research Activity 4.1 (Textbook Analysis) on page 12.docx
Complete Action Research Activity 4.1 (Textbook Analysis) on page 12.docxComplete Action Research Activity 4.1 (Textbook Analysis) on page 12.docx
Complete Action Research Activity 4.1 (Textbook Analysis) on page 12.docx
 
Complete Akron Childrens Hospital Case. Answer the fo.docx
Complete Akron Childrens Hospital Case. Answer the fo.docxComplete Akron Childrens Hospital Case. Answer the fo.docx
Complete Akron Childrens Hospital Case. Answer the fo.docx
 
Complete Action Research Activity 4.1 (Textbook Analysis) on pag.docx
Complete Action Research Activity 4.1 (Textbook Analysis) on pag.docxComplete Action Research Activity 4.1 (Textbook Analysis) on pag.docx
Complete Action Research Activity 4.1 (Textbook Analysis) on pag.docx
 
CompletarProvide the correct present participle for each verb..docx
CompletarProvide the correct present participle for each verb..docxCompletarProvide the correct present participle for each verb..docx
CompletarProvide the correct present participle for each verb..docx
 
Complete both parts of this assignment and submit as a s.docx
Complete both parts of this assignment and submit as a s.docxComplete both parts of this assignment and submit as a s.docx
Complete both parts of this assignment and submit as a s.docx
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 

CMIT 321 Executive Proposal ProjectThe purpose of this project is .docx

  • 1. CMIT 321 Executive Proposal Project The purpose of this project is to evaluate the student’s ability to research and evaluate security testing software and present a proposal for review by executive team members. By completing the document the student will also gain practical knowledge of the security evaluation documentation and proposal writing process. The project will enable the student to identify and understand the required standards in practice, as well as the details that should be covered within a proposal. Project Deliverable · Using the Case Study presented in this document, to complete an executive proposal. · Provide a three to five page proposal summarizing purpose and benefit of chosen security software to the executive management team. · The student will evaluate and test security testing software for purposes of testing corporate network security. The purpose of the software is to measure the security posture of the organization by identifying vulnerabilities and help prevent future attacks and deter any real-time unknown threats. · The proposal should effectively describe the software in a manner that will allow the executive team members to understand the purpose and benefits of the software to approve purchase. Guidelines ·
  • 2. Evaluate and select a security tool for recommendation that you learned about in the iLabs modules or the EC-Council text books. · The proposal document must be 3 to 5 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects. · At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References." · Appropriate citations are required. See the syllabus regarding plagiarism policies. · This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity. · The paper is due during Week 7 of this course. Project Description The purpose of project is to write an executive proposal for a fictitious company called Advanced Research. The goal of the proposal is to persuade the executive management team to approve purchase of security testing software that can benefit the company’s corporate network security by testing and identifying vulnerabilities before they are exploited by hackers. The proposal must include a detailed description of the software, its purpose and benefits.
  • 3. Suggested Approach Research a security testing software tool that you practiced using in the EC-Council iLabs or from the textbook. Determine whether the tool would be beneficial in testing the security of a corporate network. Use the vendor’s website to collect necessary information about the tool to be able to explain its purpose and benefit. Include 3 rd party endorsements and case studies about the tool. Integrate the information from your own experience with the tool into your proposal. This may include results from the iLab exercises or your own test lab. Company Description Advanced Research Corporation Advanced Research is a startup medical research and development company. After five years of extraordinary success in the development of innovative medical and pharmaceutical products, Advanced Research is on its way to becoming a major player in the medical research and development industry. However, due to its success, Advanced Research has also become a major target of cybercriminals. Advanced Research has been the victim of cybercriminal attempts to steal intellectual property and sell it to Advanced Research’s competitors. It is suspected that the corporate network has been infiltrated from unauthorized sources more than once. In 2011, Advanced Research was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of Advanced Research’s public website and several Denial of Service attacks at different times over a 9 month period that brought the corporate network to its knees. These attacks had a major impact on Advanced Research’s ability to
  • 4. conduct business and resulted in undesirable publicity for the company. Regardless of its security problems, Advanced Research has continued to grow as a company. Its research and development departments have grown over the years, due to the expansion of the company, in proportion to the increase in its business making up over 40% of the human resources. Advanced Research’s innovative research and development information is paramount to its continued success as a company. Although, no known attacks have occurred in last 18 months, the security of its network and intellectual property is still a major concern for the company. Because Advanced Research is a still fairly young company, management has been hesitant to budget for expensive security projects. However, this point of view is beginning to change. Particularly, because one of Advanced Research’s competitors, a major player in the medical research and development industry for over 40 years, experienced a loss of hundreds of millions of dollars in research data that was stolen from its corporate network by cyber thieves. Background and your role You are the IT Manager hired in 2012 to manage the physical and operational security of Advanced Research’s corporate information system. You understand information security issues better than anyone else in the company. You also know that the network is vulnerable to outside threats because it has experienced attacks in the past and because you haven’t had the resources to properly test the corporate information system to identify the vulnerabilities that might exist and take action prevent possible attacks. You have a responsibility to bring these concerns to the attention of the executive team and ask for approval to purchase the necessary testing software. Your education and training have introduced you to variety of security tools for testing computer and network security. The majority of these tools you either only read about or have
  • 5. practiced using in lab environment. You have decided to research some of these tools and test them out in your own lab environment and choose one for recommendation to executive team. You will need to present information that proves the chosen tool will be beneficial to the security of corporate information system. To accomplish this you will need to research the product, if possible, test the product in a virtual lab environment. If the tool is part of your iLab exercise, it is recommended that you practice using and testing the tool beyond the scope of the lab exercise. Based on your research and analysis, you will include this information in your proposal in way that the executive staff can understand and allowing them to make an informed decision to approve purchase of the product. The executive management team of Advanced Research: The proposal should include: · Detailed description of the software and benefits. · Include reviews, case studies and customer recommendations · Include your own hands-on experience with the tool and test results · Cost of product. Include additional costs such as training or hardware software that might be needed in order to properly deploy manage and maintain the software. · How will the software impact the production environment? For
  • 6. example, the software may test for Denial of Service attacks. You need to explain any interruptions the test may have on business operations. You need to justify the need for such a test. Also explain how to you plan to minimize or prevent possible production outages. The software should test for one or more of the following types of attacks: · Denial of Service (DoS) · Cross Site Scripting (XSS) · Authentication Bypass · Directory Traversal · Session Management · SQL injection · Database Attacks · Password Attacks · Firewall/Router Attacks ·
  • 7. Operating System Attacks Corporate Office Network Topology The Advanced Research main research and development facility is located in Reston Virginia. You have concerns about the sensitive information that is stored at this location as well as data that transmitted over the WAN to Advanced Research’s New York City headquarters location, business partners and clients. The Reston facility is also where the Advanced Research data center is located. The data center is where Advanced Research’s public website, email, databases and corporate intranet are hosted. The environment contains a mix of Microsoft and *NIX technologies. · 45 Windows 2008 Servers · 13 Windows 2003 Servers · 15 UNIX Servers · 2200 Windows XP and 7 Desktops · Web Servers: Apache and IIS · Services: FTP, SMTP, DNS, DHCP, VPN · Database: SQL, Oracle and MySQL ·
  • 8. Network: Cisco Routers and Firewalls Grading Rubrics Final Deliverable Category Points % Description Documentation and Formatting 10 10% Appropriate APA citations/referenced sources and formats of characters/content. Software Research 20 20% Accurate Completion of Software Research Software Analysis 20 20% Accurate Completion of Software Analysis Executive Proposal 50 50% Provide proposal for purchase Total 100 100% A quality paper will meet or exceed all of the above requirements.