Chat with us, powered by LiveChat In this assignment, you assess the vulnerabilities of a web application that has been chosen by a company seeking to establish an online presence. Scenario - Tutorie

In this assignment, you assess the vulnerabilities of a web application that has been chosen by a company seeking to establish an online presence. Scenario

 

In this assignment, you assess the vulnerabilities of a web application that has been chosen by a company seeking to establish an online presence.

Scenario

Montana Out Door Inc. (MOD) is a provider of outdoor equipment and hunting adventures in Montana. The CEO has decided to pursue a digital transformation designed to support a more robust Internet presence including integrated social media outreach and an online store that integrates with its newly adopted software solutions including HubSpot Suite for CRM, SAP SCM for supply chain management, and Salesforce Service Cloud to support the expansion.

Security is an obvious consideration for this endeavor and you have been asked to assess the security risks of the integration of one of these systems with the Internet and other internal systems. In assignments 2 and 3 you will address integration policies and testing respectively.

Preparation

Choose one of the applications identified in the scenario and research its vulnerabilities and ways to safeguard them.

Instructions

Consider the scenario and the research you performed on your chosen application and do the following:

  • Describe 3 significant security vulnerabilities inherent in the software that includes historical security performance data. Cite your sources.
  • Describe 2 security tools designed to mitigate one of the vulnerabilities. One should be internal to the software and the other a 3rd party solution. Explain how each works.
  • Evaluate the application's effectiveness in addressing 5 of the following security elements. Rank each as Excellent, Good, or Weak. Support the rationale for your ranking.
    • Data encryption
    • Access control and management
    • Data retention
    • Management and processing
    • System login requirements
    • Process monitoring and traceability
    • Analysis and reconstruction of transactions and events due to adversarial actions (forensic reconstruction)
    • Integration with the existing Oracle DB

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Evaluate application technologies and the security issues associated with them.

View Rubric
 

    Are you struggling with this assignment?

    Our team of qualified writers will write an original paper for you. Good grades guaranteed! Complete paper delivered straight to your email.

    Place Order Now