Executive Proposal
Aicha Doudou
UMUC
May 9, yAs new technology emerges, the Internet evolve and computer network gets bigger and bigger, the need for network security has become one of the most important factors for all organizations and companies to consider (Popescu, 2013). Network security is important for an organization or company’s well being. Increasing network security decreases the change privacy spoofing, identity or information theft. Network security is something that companies should take seriously. An unsecured network system can comprises a company’s files and reputations all at the same time. An organization needs to use a tool that will ensure security efficiency and monitoring. North Shore Medical Research (NSMR) …show more content…
is a medical research and development company that is experiencing extraordinary growth and success. NSMR has been a target for cybercriminals during the past year and as NSMR continues to develop as a major player in the research and development industry, it remains as the major target for cybercriminals due to system vulnerabilities. In order to prevent further exploitation of the company’s system vulnerabilities, NSMR must purchase Proxy Workbench, which will displayed all NSMR’s data passing through it in real time.
North Shore Medical Research (NSMR) is a startup medical research and development company.
After five years of extraordinary success in the development of innovative medical and pharmaceutical products, NSMR is on its way to becoming a major player in the medical research and development industry. However, due to its success, NSMR has also become a major target of cybercriminals. NSMR has been the victim of cybercriminal attempts to steal intellectual property and sell it to NSMR’s competitor. Management suspects the corporate network has been infiltrated from unauthorized sources more than once. In 2011, NSMR was falsely accused of unethical research and development practices. The false allegations resulted in the defacement of NSMR’s public website and several Denial of Service attacks at different times over a 9-month period that brought the corporate network to its knees. These attacks had a major impact on NSMR’s ability to conduct business and resulted in undesirable publicity for the company. Even with all the attack, NSMR has continued to grow as a company. Its research and development departments have grown over the years, due to the expansion of the company. NSMR’s innovative research and development information is vital to its continued success as a company. The security of NSMR’s network and intellectual property is a major concern for the company but management has been hesitant to spend expense on network security projects, due to the fact that NSMR is still a start up company. But that all change when NSMR’s learn of the attack on one of NSMR’s major competitors in the medical research and development industry for over 40 years, experienced a loss of hundreds of millions of dollars in research data that was stolen from its corporate network by cyber thieves. NSMR needs to monitor network traffic in order to recognize and identify DDOS attacks and any other available attacks in real
time.
Proxy Workbench is a proxy server ideal for security experts, trainer and developers, (Proxy Workbench Team, n.d.) that displays its data in real time, allowing the user to actually see data flowing between the e-mail client and the e-mail server, web browser, and web server or even analyze FTP in both passive and active modes. In addition to all this, Proxy Workbench pass through protocol handler enables analysis of protocols where the server does not readily change (International Council of E-Commerce Consultants, 2010, p. 3-58). Proxy Workbench features include the following:
Data is displayed in real time: data can be color coded to indicate data direction. The real-time data can optionally include comments about data arrival and source (International Council of E-Commerce Consultants, 2010, p. 3-58).
Connection diagram: This provides an animated graphical representation of the life of a socket connection so that problems can be readily identified and analyzed
Native ability to analyze HTTP, SOAP, Web services, FTP and pass-through communications (International Council of E-Commerce Consultants, 2010, p. 3-58).
The ‘data purge’ settings allow fine-tuning for the amount of data Proxy Workbench stores in memory before it is freed.
The data can be presented in one of 5 formats: ASCII, Hexadecimal, Octal, Decimal or Binary.
Users can individually manage the ports that Proxy Workbench monitors and listens on and dynamically allocate a protocol handler to these ports (Proxy Workbench Team, n.d.).
Socket processing exceptions are presented in a separate error window for quick analysis.
Proxy Workbench can be configured to ‘stay on top’ of all other windows to allow for detailed analysis of its data (Proxy Workbench Team, n.d.).
Proxy Workbench is a shareware program, which means users can download and use Proxy Workbench for free during 30-days trial period. After this period users need to decide whether to buy Proxy Workbench software for $150.00 or uninstall the program. Proxy Workbench works with Windows 98/XP/Vista operating system and supports English interface languages. Proxy Workbench does not contain any spyware and/or advertise modules, allowing users to install it with no worries concerning valuable information loss (rbytes, n.d.). Proxy Workbench would test for session management by keeping track of communication between the web browser and web server. It would also check for authentication bypass.
Proxy Workbench is a proxy server that resides inside the network and monitors the connection, supporting proxy chaining. Proxy Workbench should be installed on all Windows servers and desktop. The IT manager would like to request the executive staff to approve the purchase of Proxy Workbench. This Proxy Workbench that displays data in real time, would allow the IT manager to actually see the communication between the e-mail client and the e-mail server, web browser and web server as well as keep track of any anonymous users.References
International Council of E-Commerce Consultants. (2010). Scanning. Ethical hacking and countermeasures: Attack phases (pp. 3-58). Clifton Park, NY: Course Technology, CENGAGE Learning.
Popescu, D. (2013, July 11). Why Is Network Security Important? Retrieved from http://www.poweradmin.com/blog/why-is-network-security-important/
Proxy Workbench Team. (n.d.). Proxy Workbench. Retrieved from http://proxyworkbench.com/