diff_months: 11

Assignment 1 Part 1 Business Details Document

Download Solution Now
Added on: 2024-11-25 03:30:44
Order Code: SA Student P Management Assignment(5_23_33664_242)
Question Task Id: 489834

Assignment 1 Part 1 Business Details Document

Name: Jupiter Security Services

Industry: IT services for small to mid-type organization

Finding and patching Vulnerability in pre-existing software

Finding and documenting weaknesses in the deployed hardware network

Security training to employees

Number of System used in the organisation: There are 150 servers, 432 Desktop and about 544 mobile devices at 2 locations combined. The servers run on Windows server 2019 and provides real time hosting security tools which helps the consulting business. They also store the information like vulnerability data and reports in highly encrypted format. In addition to these services, Jupiter Security Services use it for basic business operations. The Desktop in the organization provides real-time communication to the employees and the clients. It helps the employees to perform centralized communication and monitoring of clients system. The employees also use it to perform CRM activities. The mobile devices in the organization makes it easier for the employees to communicate swiftly. It also makes the employees to have remote business resources. It will help to rapidly address the demands of the customers.

The types (and versions) of operating systems, applications and services that are in use: Windows Server 2019, Windows 11, Kali Linux, Apple MacOS, and iOS

Office 365, Adobe Creative Suit, Security Analysis tools like Nmap, WifiteDefensive Strategy: Stateful inspection Firewall, Network DMZ, patching software and updating hardware firmware of all devices.

Assessment profile: Whitebox, because the company has pre-existing knowledge of the client and the source code of their software. SME used vulnerability assessment (VA) before.

Duration of the Test: 3 weeks, includes assessment of the hardware and software and documenting all the weaknesses which has been found.

Scope/Definition

Checking vulnerability and security of the entire IT infrastructure

Check the security of the softwares that are installed on the systems, as well as assessment of the hardware

Evaluate the effectiveness of the firewalls which are installed on the system and documenting them

Give a detailed documentation of the present vulnerability and patches to the organizations

Goals

Determine the weaknesses in the IT infrastructure of the organization

Write down the weaknesses and provide feedback to the organization

Develop a plan to fix the weaknesses and implement it

Based on the result, create a comprehensive policy to tackle such incidents in the future

Information Gathering (Foot printing)

This is the first step in gathering data about the client and its system. In this stage, the goal is to collect as much data as possible. Jupiter employees will be using regular scanning as a mean to gather information

Using public information and social engineering. Jupiter employees might scan the web for the client information and social engineer the leak to its original leaker by using tools in Kali Linux.

Jupiter services will keep a track of any unknown data packets in Wireshark during the non-operational hour of the company

Vulnerability Detection

Jupiter services will use tools in Kali to detect for any vulnerability. This tool is Nmap which is going to scan for open ports in the clients infrastructure.

Jupiter services might be able to scan the network using Wifite for all the IP addresses in the network and then point out any unknown IP address.

Scanning the application for malware which is being used by the client for any vulnerabilities.

Information Analysis and planning

After detecting for vulnerability, Jupiter services will compile the result into a file and then review it for any risk. Open ports, malware infestation, possibility of leak. The compiled file will later be reviewed by the cybersec experts at Jupiter Security Services.

A plan to tackle the security risk will be taken upon carefully. This will include a timeline upon which the task which poses maximum threat will be patched first.

Jupiter Security Services will then communicate the finding and the plan with the client and stakeholders so that they understand the risk behind the vulnerability.

Last login: Sat Apr 8 14:06:45 on console

C02XP0LUJ1GC:~ kit304$ ./cyber=params parass 593438

-sh: ./cyber=params: No such file or directory

C02XP0LUJ1GC:~ kit304$ ./cyber-params parass 593438

=========================================================================================

CyberSecurity Assignment Parameters for your SME - username: parass studentid: 593438

=========================================================================================

Employees: 400

Office locations: 2

Operating scale: country

Intrusion detection system installed? no

Firewall type: statefull inspection

Extranet used? no

Network DMZ used? yes

Wireless network (in addition to wired LANs)? no

Cloud provider: none

Web site hosting server location: DMZ

Other business servers location: DMZ

Type of web presence: standard web site

Customers (approximate): 1,000

Customer type: other businesses

Has the SME used vulnerability assessment (VA) before? yes

Has the SME used full pen-testing (PT) before? yes

Did past full PT recommend significant changes? yes

Does SME have security policies in place? no

Does SME deal with PII? yes

Does SME deal with PHI? yes

Does SME have incident response team? no

Does SME have dedicated network security staff? no

=================================================================================

C02XP0LUJ1GC:~ kit304$

CHANGES REQUIRED IN THIS ASSIGNMENT TO MAKE IT REVISED

Submission Feedback Overall Feedback ************************************cyber-params************************************

You do not need to explain terminology such as firewalls, DMZ, footprinting etc

************************************Staff Hierarchy************************************I'd suggest you also consider the company structure (eg departments) and detail employee roles - a diagram would also save on word-count.

************************************System Descriptions************************************

You should also list the other main applications (used on client machines and also server applications) (and quantify the mix of OS eg 20 devices running macOS [version?])

You should also consider in more detail what other servers they run (e.g. general databases, finance, development etc)

************************************Scope************************************This doc should also discusswhat the business wants to be in scope(so your proposal will address that specifically) eg what systems/services etc will be assessed? You should also indicate the desired timeline which should be realistic and achievable. I'd rewrite this so it appears to indicate what systems/processes/infrastructure the SME wants to be assessed, and how long they are prepared for the assessment to last. This will then inform what's achievable in the VA proposal (for example, if they say they want the assessment to only last a week, but expect everything to be assessed, that's not realistic). Also, much of what you have written in the scope/definition section onwards belongs in the VA proposal (with timelines and possible risks). You also won't be proposing to fix vulnerabilities, create policy etc, only assess them

************************************Testing Approach************************************Given cost and possible time constraints, a white box approach would possibly be more feasible..The point of the business description is to contain as much info as possible. Through prior interviews and information sharing you are likely to know what systems are present, as well as what the scope of the assessment is (i.e. what systems/services/infrastructure the SME wants to be assessed and how long they are prepared for such tests to take)

************************************PII/PHI************************************

Should this data be subject to some assessment i.e. the access controls used, the types of access methods/personnel etc? Justify why they are collecting PHI.

************************************General comment(s)************************************General comment: break down infrastructure by siteeg. number of employees, computers, servers, services and other devices, networking infrastructure (eg router(s) and switches) - a diagram would help.

************************************Summary************************************

Provide more detail on personnel and infrastructure. I'd narrow the focus of what the SME wants to be assessed - you also don't specify what tools etc in this document - that's in the VA proposal.

  • Uploaded By : Pooja Dhaka
  • Posted on : November 25th, 2024
  • Downloads : 0
  • Views : 156

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more