The writer is very fast, professional and responded to the review request fast also. Thank you.
Assignment 1: LASA 2: Security Review Report
Consider the following:
Providing a secure information systems environment requires taking a proactive approach to security. One way to do this is by hiring external security consultants or auditors to evaluate the security of an organization’s network.
Assume that you have been selected as the security consultant to perform a security review for an organization of your choice. The organization that you select for this assignment should have a public-facing website and, at minimum, one web application that can be used for this task.
You have been asked to review the website security of the organization of your choice and any web applications that are part of this site. Security risks such as SQL injection and social engineering should be considered.
For this assignment, you should begin with a footprinting analysis (security reconnaissance) of the selected organization. Gather as much background information on the organization and its website as you can.
Tasks:
Prepare an 8- to 10-page report on the following aspects:
Your final deliverable will be 8–10 pages in length; utilize at least 3–5 scholarly sources in your research. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.
Submission Details:
| Assignment 1 Grading Criteria |
Maximum Points |
| Selected an organization with a website featuring one or more web applications. Summarized footprinting analysis of the selected company. |
20 |
| Explained how the information gathered during your footprinting analysis could be utilized to initiate an attack against the organization. |
36 |
| Described potential social engineering methods that could be used to acquire information about the organization’s computing environment. |
24 |
| Listed appropriate prevention techniques that can be used to thwart such social engineering techniques. |
24 |
| Enumerated a series of countermeasures that can be used to avoid this type of footprinting attack. |
24 |
| Identified a list of web server vulnerabilities that the organization is most susceptible to. |
36 |
| Determined which threats against the organization’s web applications pose the greatest risk to the organization. |
36 |
| Described how an SQL injection could pose a potential security threat to the organization’s web applications. |
36 |
Writing components:
|
64 |
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more