Preview

Week 4 Assignment

Good Essays
Open Document
Open Document
815 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 4 Assignment
IS3110
Business Continuity Planning
Week 4 Assignment

Tyrone Pendarvis

The scenario I am proposing to test the BCP for the company is a hacker scenario. A hacker attempts to break into the network and access delicate information that shouldn’t be accessible by anyone outside of the company. The combination of business and IT transformation, compliance and governance demands and the onslaught of security threats continues to make the job of safeguarding data assets a serious challenge for organizations of all types—from multinational corporations to independent merchants to government entities. The purpose of this test would be to see how quickly the attack is detected and stopped in addition to tracking to discover the identity of the hacker.
Today, organizations need not only to understand current trends in security threats but also be able to identify inherent vulnerabilities within existing systems.For this exercise to be successful, I would suggest employing an ethical hacker – a person who is not with the company but is very knowledgeable about and can use techniques that hackers use to break into corporate networks. An ethical hacker though is not a person who does so for malicious purposes, but to analyzed and discovered the top vulnerabilities and threats that have the most potential to negatively impact to the organization for security purposes. The reason for employing someone who is not with the company for this test is simple: it is to guage the response of those in the IT department. Since the IT department is relatively small – only 12 people, it would be difficult to run this test if one of them were roleplaying the hacker from outside of the company.
Cybercriminals will never stop trying to compromise systems to obtain data. Organizations need to be aware of where they may be open to attacks, how attackers can enter their environment and what to do if (and when) an attack occurs. This test should be done as a surprise attack, since a hacker

You May Also Find These Documents Helpful

  • Satisfactory Essays

    To provide the quality that has customers returning for our service, we design the project by doing a penetration test at the end. This is because we assure all our jobs to be secured and free from exploitable vulnerabilities at the end. So, with the penetration test we will simulate a hacker and try everything to break into the network and steal information. If we are able to breach the network we will fix the vulnerability. This will continue until there is no more way for us to get in. The idea behind our strategy is that if we cannot get in, then hacker will not be able to get in either. This signifies a high standard of quality.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Explain both the information systems security practitioner and hacker perspectives for performing a penetration test…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 2 Assignment

    • 320 Words
    • 2 Pages

    Before agreeing to the contract I would like to outline some risks that goes with this current project. I will address the concerns by showing you the qualitative and the quantitative risks…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    4. Before you conduct an ethical hacking process or penetration test on a live production network, what…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 3 assignment

    • 850 Words
    • 3 Pages

    From the perspective of six pillars of character, if I were Cindie, I would be honest with Lyndell and tell him what’s been bothering me. Hopefully, by keeping quiet about him leaving early, he will feel that I’m trustworthy enough to tell me his problems, whether it’s drinking or any other problems he is facing in his life. I might be able to help him or at least come up with some ideas to help him. I will also respect him more if he can open up to me and is willing to fix his problems. If he continues to leave early, I would have no choice but to report this situation to the store manager because I would feel responsible if something bad happens to the store while I was on duty alone. Apparently, Lyndell is not a responsible person because he leaves work early and makes Cindie do part of his job. Cindie is responsible because even though it got really busy when 10 Japanese customers came in at the same time one night, she rushed through and was able to satisfy the customers’ needs. It is not fair to Cindie that she has to close up by herself and often work the late shift just because she is the “new kid on the block” (Mintz & Morris, 2011). Everybody should be treated equally (Mintz & Morris, 2011).…

    • 850 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    week 4 assignment

    • 304 Words
    • 2 Pages

    Financial planning is the steps or goals used by a company to accomplish financial goals and prepare for future projects or investments. Starbucks has to have a very detailed financial plan in place especially when planning to expand internationally. When conducting business internationally there are some risk factors that do not apply when conducting domestic business. Starbucks has to first consider foreign exchange rates, political climates and events, and international trade laws are just a few. Another risk factor would be being able to trust the people you’re dealing with. Will the supplier be able to deliver the same quality product that your domestic businesses are supplying? When operating business in foreign countries a business wants to be sure that the product will remain the same quality especially when Starbucks is putting their name on the product. They expect the product to be the same as they have been producing domestically. Another thing to be considered by Starbucks is the environmental risks. Some companies have stricter laws pertaining to permits and document filing. It may be more difficult for Starbucks to get their plan approved in a foreign country. The final thing that needs to be considered is the financial risk. At one time, the U.S. dollar was king and traded favorably against all other currencies as the global reserve currency. “In recent years, the dollar has lost some of its ground to other currencies. If you own a U.S. company engaging in business overseas, the risk and expense involved in converting dollars to the local currency may fall on your shoulders where it once did not.” (Morello, 2013). Starbucks should consider operating in a country where they can bank with the same bank internationally as they bank with domestically.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 1159 Words
    • 5 Pages

    Please complete the following 5 exercises below in either Excel or a word document (but must be single document). You must show your work where appropriate (leaving the calculations within Excel cells is acceptable). Save the document, and submit it in the appropriate week using the Assignment Submission button.…

    • 1159 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Week 7 Assignment

    • 251 Words
    • 2 Pages

    No, I don’t feel the test was accurate, the reason I feel the test is not accurate is because to me a person’s intelligence cannot be measured by stupid questions. Not everyone can do well on test, especially if the test is being timed and I am one of those people.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 8 Assignment

    • 689 Words
    • 3 Pages

    I do not think limitless growth is possible. As growth relies on the resources from The Earth, we can only have so much. The ever disappearing resources are consequences of the one basic mistake, the commitment to affluence and growth. They are all being generated by the pursuit of material living…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Penetration Plan

    • 2140 Words
    • 9 Pages

    Northcutt, S., Shenk, J., Shackleford, D., Rosenberg, T., Siles, R., & Mancini, S. (2006, June). Penetration testing: Assessing your overall security before attackers do. Retrieved from http://www.sans.org/reading_room/analysts_program/PenetrationTesting_June06.pdf…

    • 2140 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Notes

    • 1370 Words
    • 6 Pages

    The company decided to put in place a mechanism dealing with vulnerability assessment, as well as a strategy to check the company’s network system to assess any form of vulnerabilities which could allow any external unauthorized access to the facility. In the past, the company had experienced a case of malware infection which nearly interfered with network system, almost bringing it down. This called for an urgent need to check the IT check up in preparation for an external audit. Therefore, the need for cyber security capability within organizations has been highlighted recently with the increases in cases of hacking which have been consistent within the organization before realizing that it was under attack. According to Wilshusen, 2010, cyber attack is likely to have far reaching consequences to any organization as making efforts to build and maintain trust and repair potential reputation with the customers and stakeholders.…

    • 1370 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Week 5 Assignment

    • 570 Words
    • 2 Pages

    Answer the following questions in 100 to 250 words each. Provide citations for all the sources you use.…

    • 570 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cryptanalysis

    • 1790 Words
    • 8 Pages

    9. The Ethical Hack: A Framework For Business Value Penetration Testing/ James S. Tiller, 2005.…

    • 1790 Words
    • 8 Pages
    Powerful Essays