You are the network administrator of a department store based in Medina. Your team has been faced with hackers intercepting the store’s website and customers’ credit card information. You need to develop a strategy using security best practices to protect the customers’ data.
Directions:
Write a paper that includes the following:
A description of the major security concerns for web or mobile application development,
A detailed explanation of the security measures you would incorporate to transmit data, and
An assessment of the security measures needed to be considered and implemented to ensure the proper authentication and authorization.
Keep in mind, we are most interested in your ability to describe the OWASP top 10 recommendations and the steps you would take to enforce security based on OWASP’s list of top vulnerabilities. Use diagrams, where appropriate.
===================
(Second essay)
System Security Goals
In an essay, answer the following questions based on this week’s module:
How do you know if your system is meeting your security goals?
You can verify that controls are working, but how do you know if they are getting the job done?
What auditing practices or procedures would you implement for your organization? Why?
=========
(Third essay)
Securing the Cloud
Cloud computing will continue to grow as the environment of choice for organizations of any size. Cloud computing is the practice of renting computer resources from a provider instead of owning the resources.
Discuss two positive and two negative aspects associated with cloud computing. Also provide an example of two security concerns with cloud computing and how you would mitigate those threats. Support your answers with information and examples from your text and your experiences.
=========
(Fourth essay)
Web Browser Hacking
Scenario:
You are the network administrator of a regional bank based in Jeddah. Your team has been faced with hackers intercepting clear-text transmissions of sensitive data. You need to develop a strategy using various penetration testing techniques to protect the bank’s information.
Directions
that includes the following:
How you can secure web browsers so that criminals are not able to access customer personal data,
An explanation of the different types of data that can be accessed such as locations, work habits, passwords, etc.
Details on the best practices you will incorporate to deter hackers from data mining to collect customer data.
Keep in mind, we are most interested in your ability to describe the penetration techniques and tools you would use to enforce security throughout the enterprise. Use diagrams, where appropriate.
=================
((Notes))
Every essay should be :
– 5-6 pages in length, not including the reference and abstract pages.
-Cover all points
-at least 4 academic resources.
-Cite all sources using APA style guidelines, citing references as appropriate.
– Plagiarism less than 15%
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more