Preview

Week 4 Assignment

Good Essays
Open Document
Open Document
815 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 4 Assignment
IS3110
Business Continuity Planning
Week 4 Assignment

Tyrone Pendarvis

The scenario I am proposing to test the BCP for the company is a hacker scenario. A hacker attempts to break into the network and access delicate information that shouldn’t be accessible by anyone outside of the company. The combination of business and IT transformation, compliance and governance demands and the onslaught of security threats continues to make the job of safeguarding data assets a serious challenge for organizations of all types—from multinational corporations to independent merchants to government entities. The purpose of this test would be to see how quickly the attack is detected and stopped in addition to tracking to discover the identity of the hacker.
Today, organizations need not only to understand current trends in security threats but also be able to identify inherent vulnerabilities within existing systems.For this exercise to be successful, I would suggest employing an ethical hacker – a person who is not with the company but is very knowledgeable about and can use techniques that hackers use to break into corporate networks. An ethical hacker though is not a person who does so for malicious purposes, but to analyzed and discovered the top vulnerabilities and threats that have the most potential to negatively impact to the organization for security purposes. The reason for employing someone who is not with the company for this test is simple: it is to guage the response of those in the IT department. Since the IT department is relatively small – only 12 people, it would be difficult to run this test if one of them were roleplaying the hacker from outside of the company.
Cybercriminals will never stop trying to compromise systems to obtain data. Organizations need to be aware of where they may be open to attacks, how attackers can enter their environment and what to do if (and when) an attack occurs. This test should be done as a surprise attack, since a hacker

You May Also Find These Documents Helpful

  • Satisfactory Essays

    To provide the quality that has customers returning for our service, we design the project by doing a penetration test at the end. This is because we assure all our jobs to be secured and free from exploitable vulnerabilities at the end. So, with the penetration test we will simulate a hacker and try everything to break into the network and steal information. If we are able to breach the network we will fix the vulnerability. This will continue until there is no more way for us to get in. The idea behind our strategy is that if we cannot get in, then hacker will not be able to get in either. This signifies a high standard of quality.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Explain both the information systems security practitioner and hacker perspectives for performing a penetration test…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    4. Before you conduct an ethical hacking process or penetration test on a live production network, what…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are several steps that need to take place while planning and executing a penetration test. The first is the planning and preparation stage. During this stage, penetration testers and management personnel should hold a meeting to determine the exact scope, goals, and method of the penetration test. Failure to do this will only result in a list of exploitable vulnerabilities without any type of prioritization or guidelines for the organization. Since these tests can cause networks to crash or connectivity to slow tremendously, it is very important the penetration testers know what kinds of tests are and are not acceptable to management. Legal documents should also be drafted during this time to protect the penetration testers. Since the testing involves acts that would normally be illegal and could compromise confidential information, these documents can outline how the information will be handled, returned and/or destroyed. A liability waiver should also be included to protect the testers from and ramifications of any system damage during the test.…

    • 591 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Week 3 Assignment

    • 349 Words
    • 2 Pages

    The 2 articles I had chosen are on Blackfish and Sea World. The first title is called SeaWorld Questions Ethics of ‘Blackfish’ Investigator. I always thought that there was no doubt in my mind that Sea World was a good place that was until the movie Blackfish came out. This first article is about questioning the ethics that the investigator used to gain his insight on the killer whales that he used for the movie. I feel like this is not a good creditable source because there are many bias issues at hand which tends to lean towards one side which in this article is Sea world. How I can to this decision is the facts at hand which Sea world is only showing their side at hand. To think one sided is very bias because they want the reader to think they are right. The article reveled to me that Sea World has something to hide when they can’t explain why they think that all the investigators information is wrong. With no substantial evidence and/ or qualified personnel.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 1159 Words
    • 5 Pages

    Please complete the following 5 exercises below in either Excel or a word document (but must be single document). You must show your work where appropriate (leaving the calculations within Excel cells is acceptable). Save the document, and submit it in the appropriate week using the Assignment Submission button.…

    • 1159 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 7 Assignment

    • 251 Words
    • 2 Pages

    No, I don’t feel the test was accurate, the reason I feel the test is not accurate is because to me a person’s intelligence cannot be measured by stupid questions. Not everyone can do well on test, especially if the test is being timed and I am one of those people.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 8 Assignment

    • 689 Words
    • 3 Pages

    I do not think limitless growth is possible. As growth relies on the resources from The Earth, we can only have so much. The ever disappearing resources are consequences of the one basic mistake, the commitment to affluence and growth. They are all being generated by the pursuit of material living…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Penetration Plan

    • 2140 Words
    • 9 Pages

    Northcutt, S., Shenk, J., Shackleford, D., Rosenberg, T., Siles, R., & Mancini, S. (2006, June). Penetration testing: Assessing your overall security before attackers do. Retrieved from http://www.sans.org/reading_room/analysts_program/PenetrationTesting_June06.pdf…

    • 2140 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Notes

    • 1370 Words
    • 6 Pages

    The company decided to put in place a mechanism dealing with vulnerability assessment, as well as a strategy to check the company’s network system to assess any form of vulnerabilities which could allow any external unauthorized access to the facility. In the past, the company had experienced a case of malware infection which nearly interfered with network system, almost bringing it down. This called for an urgent need to check the IT check up in preparation for an external audit. Therefore, the need for cyber security capability within organizations has been highlighted recently with the increases in cases of hacking which have been consistent within the organization before realizing that it was under attack. According to Wilshusen, 2010, cyber attack is likely to have far reaching consequences to any organization as making efforts to build and maintain trust and repair potential reputation with the customers and stakeholders.…

    • 1370 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Cryptanalysis

    • 1790 Words
    • 8 Pages

    9. The Ethical Hack: A Framework For Business Value Penetration Testing/ James S. Tiller, 2005.…

    • 1790 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Week 5 Assignment

    • 570 Words
    • 2 Pages

    Answer the following questions in 100 to 250 words each. Provide citations for all the sources you use.…

    • 570 Words
    • 2 Pages
    Good Essays