Week 3

 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

In this assignment, you assess the vulnerabilities of a web application that has been chosen by a company seeking to establish an online presence.

Scenario

Montana Out Door Inc. (MOD) is a provider of outdoor equipment and hunting adventures in Montana. The CEO has decided to pursue a digital transformation designed to support a more robust Internet presence including integrated social media outreach and an online store that integrates with its newly adopted software solutions including HubSpot Suite for CRM, SAP SCM for supply chain management, and Salesforce Service Cloud to support the expansion.

Security is an obvious consideration for this endeavor and you have been asked to assess the security risks of the integration of one of these systems with the Internet and other internal systems. In assignments 2 and 3 you will address integration policies and testing respectively.

Preparation

Choose one of the applications identified in the scenario and research its vulnerabilities and ways to safeguard them.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Instructions

Consider the scenario and the research you performed on your chosen application and do the following:

  • Describe 3 significant security vulnerabilities inherent in the software that includes historical security performance data. Cite your sources.
  • Describe 2 security tools designed to mitigate one of the vulnerabilities. One should be internal to the software and the other a 3rd party solution. Explain how each works.
  • Evaluate the application’s effectiveness in addressing 5 of the following security elements. Rank each as Excellent, Good, or Weak. Support the rationale for your ranking.

    Data encryption
    Access control and management
    Data retention
    Management and processing
    System login requirements
    Process monitoring and traceability
    Analysis and reconstruction of transactions and events due to adversarial actions (forensic reconstruction)
    Integration with the existing Oracle DB

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the

Library site

for all support. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Evaluate application technologies and the security issues associated with them.

View Rubric
 

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER