Ethical Hacking Discussion

Hacking Mobile-iLab Screen Shot Example.pdf (1.09 MB)

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Cloud Computing-iLab Screen Shot Example.pdf (1.09 MB)

Cryptography-iLab Screen Shot Example.pdf (1.09 MB)

Executive Proposal-321 Executive Proposal_2018.docx (97.3 KB)

Hacking Web Applications

CMIT 321 Executive Proposal Project
The purpose of this project is to evaluate the student’s ability to research and evaluate security
testing software and present a proposal for review by executive team members. By completing
the document the student will also gain practical knowledge of the security evaluation
documentation and proposal writing process. The project will enable the student to identify
and understand the required standards in practice, as well as the details that should be covered
within a proposal.
Project Deliverable




Using the Case Study presented in this document, to complete an executive proposal.
Provide a three to five page proposal summarizing purpose and benefit of chosen security
software to the executive management team.
The student will evaluate and test security testing software for purposes of testing
corporate network security. The purpose of the software is to measure the security
posture of the organization by identifying vulnerabilities and help prevent future attacks
and deter any real-time unknown threats.
The proposal should effectively describe the software in a manner that will allow the
executive team members to understand the purpose and benefits of the software to
approve purchase.
Guidelines






Evaluate and select a security tool for recommendation that you learned about in the
iLabs modules or the EC-Council text books.
The proposal document must be 3 to 5 pages long, conforming to APA standards. See
“Writing Resources” in the online classroom where you’ll find help on writing for research
projects.
At least three authoritative, outside references are required (anonymous authors or web
pages are not acceptable). These should be listed on the last page titled “References.”
Appropriate citations are required. See the syllabus regarding plagiarism policies.
This will be graded on quality of research topic, quality of paper information, use of
citations, grammar and sentence structure, and creativity.
The paper is due during Week 7 of this course.
Project Description
The purpose of project is to write an executive proposal for a fictitious company called MediReady. The goal of the proposal is to persuade the executive management team to approve
purchase of security testing software that can benefit the company’s corporate network
security by testing and identifying vulnerabilities before they are exploited by hackers. The
proposal must include a detailed description of the software, its purpose and benefits.
Suggested Approach
1. Research a security testing software tool that you practiced using in the EC-Council iLabs
or from the textbook.
2. Determine whether the tool would be beneficial in testing the security of a corporate
network.
3. Use the vendor’s website to collect necessary information about the tool to be able to
explain its purpose and benefit.
4. Include 3rd party endorsements and case studies about the tool.
5. Integrate the information from your own experience with the tool into your proposal.
This may include results from the iLab exercises or your own test lab.
Company Description
Medi-Ready
Medi-Ready is a startup medical research and development company. After five years of
extraordinary success in the development of innovative medical and pharmaceutical products,
Medi-Ready is on its way to becoming a major player in the medical research and development
industry. However, due to its success, Medi-Ready has also become a major target of
cybercriminals. Medi-Ready has been the victim of cybercriminal attempts to steal intellectual
property and sell it to Medi-Ready’ competitors. It is suspected that the corporate network has
been infiltrated from unauthorized sources more than once. In 2013, Medi-Ready was falsely
accused of unethical research and development practices. The false allegations resulted in the
defacement of Medi-Ready’ public website and several Denial of Service attacks at different
times over a 9 month period that brought the corporate network to its knees. These attacks
had a major impact on Medi-Ready’ ability to conduct business and resulted in undesirable
publicity for the company.
Regardless of its security problems, Medi-Ready has continued to grow as a company. Its
research and development departments have grown over the years, due to the expansion of
the company, in proportion to the increase in its business making up over 40% of the human
resources. Medi-Ready’ innovative research and development information is paramount to its
continued success as a company. Although, no known attacks have occurred in last 18 months,
the security of its network and intellectual property is still a major concern for the company.
Because Medi-Ready is a still fairly young company, management has been hesitant to budget
for expensive security projects. However, this point of view is beginning to change. Particularly,
because one of Medi-Ready’ competitors, a major player in the medical research and
development industry for over 40 years, experienced a loss of hundreds of millions of dollars in
research data that was stolen from its corporate network by cyber thieves.
Background and your role
You are the IT Manager hired in 2015 to manage the physical and operational security of MediReady’ corporate information system. You understand information security issues better than
anyone else in the company. You also know that the network is vulnerable to outside threats
because it has experienced attacks in the past and because you haven’t had the resources to
properly test the corporate information system to identify the vulnerabilities that might exist
and take action prevent possible attacks. You have a responsibility to bring these concerns to
the attention of the executive team and ask for approval to purchase the necessary testing
software.
Your education and training have introduced you to variety of security tools for testing
computer and network security. The majority of these tools you either only read about or have
practiced using in lab environment. You have decided to research some of these tools and test
them out in your own lab environment and choose one for recommendation to executive team.
You will need to present information that proves the chosen tool will be beneficial to the
security of corporate information system. To accomplish this you will need to research the
product, if possible, test the product in a virtual lab environment. If the tool is part of your iLab
exercise, it is recommended that you practice using and testing the tool beyond the scope of
the lab exercise. Based on your research and analysis, you will include this information in your
proposal in way that the executive staff can understand and allowing them to make an
informed decision to approve purchase of the product.
The executive management team of Medi-Ready:
CEO
Jessica Jones
Vice President
Exec. Assistant
Joe Hull
Jill Jules
CFO
CCO
CIO
Brain Reeves
Karen Singer
Brad Fuller
The proposal should include:





Detailed description of the software and benefits.
Include reviews, case studies and customer recommendations
Include your own hands-on experience with the tool and test results
Cost of product. Include additional costs such as training or hardware software that
might be needed in order to properly deploy manage and maintain the software.
How will the software impact the production environment? For example, the software
may test for Denial of Service attacks. You need to explain any interruptions the test
may have on business operations. You need to justify the need for such a test. Also
explain how to you plan to minimize or prevent possible production outages.
The software should test for one or more of the following types of attacks:








Denial of Service (DoS)
Cross Site Scripting (XSS)
Authentication Bypass
Directory Traversal
Session Management
SQL injection
Database Attacks
Password Attacks


Firewall/Router Attacks
Operating System Attacks
Corporate Office Network Topology
The Medi-Ready main research and development facility is located in Reston Virginia. You have
concerns about the sensitive information that is stored at this location as well as data that
transmitted over the WAN to Medi-Ready’ New York City headquarters location, business
partners and clients. The Reston facility is also where the Medi-Ready data center is located.
The data center is where Medi-Ready’ public website, email, databases and corporate intranet
are hosted. The environment contains a mix of Microsoft and *NIX technologies.








45 Windows 2016 Servers
13 Windows 2012 Servers
15 UNIX Servers
2200 Windows 10 Desktops
Web Servers: Apache and IIS
Services: FTP, SMTP, DNS, DHCP, VPN
Database: SQL, Oracle and MySQL
Network: Cisco Routers and Firewalls
Grading Rubrics
Final Deliverable
Category
Points %
Documentation and
10 10%
Formatting
Software Research
20 20%
Software Analysis
20 20%
Executive Proposal
50 50%
Total
Description
Appropriate APA citations/referenced sources and
formats of characters/content.
Accurate Completion of Software Research
Accurate Completion of Software Analysis
Provide proposal for purchase
A quality paper will meet or exceed all of the
100 100%
above requirements.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER