Project Research Proposal Executive Proposal
Order ID | 2672512591 | ||||||||||||||||||||||||||||||||||||||||||
Subject | IT | ||||||||||||||||||||||||||||||||||||||||||
Topic | Executive Proposal Project | ||||||||||||||||||||||||||||||||||||||||||
Type | Research proposal | ||||||||||||||||||||||||||||||||||||||||||
Writer level | Master’s | ||||||||||||||||||||||||||||||||||||||||||
Style | APA | ||||||||||||||||||||||||||||||||||||||||||
Sources / references | 3 minimum | ||||||||||||||||||||||||||||||||||||||||||
Language | English(U.S.) | ||||||||||||||||||||||||||||||||||||||||||
Description / paper instructions
Attached are detailed instructions. Project Executive Proposal The goal of this project is to assess your abilities to study and analyze security-testing software before submitting a proposal to the executive team for approval. You will obtain practical knowledge of the security evaluation documentation and proposal writing process by completing the document. The projects will help you identify and comprehend the requirements that must be met in practice, as well as the specifics that must be included in a proposal. Deliverables for the Project Complete an executive proposal using the Case Study offered in this article. Guidelines Consider WireShark as a security tool for recommendation (https://www.wireshark.org). Description of the project The goal of this project is to prepare an executive proposal for Information Assurance Research, a fictional organization. The proposal’s purpose is to persuade the executive management team to accept the acquisition of security testing software that can help the company’s corporate network security by testing and discovering flaws before hackers can exploit them. A full explanation of the software (Wireshark), its purpose, and benefits must be included in the proposal. Methodology Suggestions Look into using a security testing software tool like Wireshark (https://www.wireshark.org). Description of the Business The Information Assurance Corporation (IAC) is a non-profit Information Assurance is a medical research and development organization that is just getting started. Information Assurance is on its way to become a key participant in the medical research and development market after five years of outstanding achievement in the production of revolutionary medical and pharmaceutical goods. However, as a result of its success, fraudsters have turned their attention to Information Assurance. Cybercriminals have attempted to steal intellectual property from Information Assurance and sell it to the company’s competitors. It is believed that the company network has been breached by unauthorized parties on multiple occasions. Information Assurance was wrongfully accused of unethical research and development practices in 2011. The false allegations resulted in the defacement of Information Assurance’s public website, as well as several Denial of Service attacks that brought the corporate network to its knees over a 9-month period. These attacks severely harmed Information Assurance’s capacity to conduct business and resulted in negative press for the company. Despite its security issues, Information Assurance has continued to expand as a business. Its research and development divisions have increased in proportion to the company’s expansion throughout the years, accounting for more than 40% of the company’s human resources. Information Assurance’s unique research and development data is critical to the company’s long-term success. Despite the fact that no known assaults have happened in the last 18 months, the company’s network and intellectual property security remains a serious worry. Because Information Assuranceis a still fairly young company, management has been hesitant to budget for expensive security projects. This viewpoint, however, is beginning to shift. Especially since one of Information Assurance’s competitors, a significant player in the medical research and development business for over 40 years, lost hundreds of millions of dollars in research data after cyberthieves stole it from its corporate network. Background information and your role You were hired in 2012 as the IT Manager for Information Assurance’s corporate information system’s physical and operational security. You know more about information security than anybody else in the firm. You also know the network is vulnerable to outside threats since it has been attacked in the past and you haven’t had the resources to thoroughly test the business information system to discover any potential vulnerabilities and take measures to avoid attacks. You have a responsibility to bring these problems to the senior team’s notice and request permission to purchase the necessary testing software. You’ve been exposed to a variety of security tools for assessing computer and network security as a result of your education and training. The majority of these tools have only been read about or performed with in a lab setting. You’ve decided to investigate several of these tools, put them to the test in your own lab, and recommend one to the executive team. You’ll need to show evidence that the instrument you’ve picked will improve the security of the company’s information system. To do so, you’ll need to do some research on the product and, if possible, test it in a virtual lab setting. If you’re utilizing the tool as part of an iLab exercise, it’s a good idea to practice using and testing it outside of the lab. Based on your research and analysis, you’ll include this information in your proposal in a way that the executive team will comprehend, allowing them to make an informed judgment on whether or not to authorize the product’s purchase. Information Assurance’s executive management team consists of the following individuals: The following items should be included in the proposal: Detailed overview of the software as well as its advantages. One or more of the following types of attacks should be tested by the software: Service Disruption (DoS) Topology of the Corporate Office Network The major research and development facility for Information Assurance is in Reston, Virginia. You are concerned about the sensitive data maintained at this site, as well as data transported across the WAN to Information Assurance’s headquarters in New York City, business partners, and clients. The Information Assurance data center is also housed at the Reston building. Information Assurance’s public website, email, databases, and business intranet are all hosted in the data center. Microsoft and *NIX technologies are used in the environment. 45 Servers running Windows 2008 13 15 UNIX Servers 2200 Windows 2003 Servers Desktops using Windows XP and Windows 7 Grading Rubrics
Rubric:
|