ACME Blue Company is a reseller of custom-made t-shirts. The company\'s main off
ID: 3602637 • Letter: A
Question
ACME Blue Company is a reseller of custom-made t-shirts. The company's main office and distribution center are located in Miami. About 30 people are working in the main office in management, accounting, design, production, distribution, and manufacturing. There are also 10 sales people working as independent contractors working from home in different cities in Florida. The main office has 3 Windows 2008 Servers and two dozen desktop and laptop computers. One of the servers is used as a file server to keep all the company data (i.e., t-shirt designs), and customer personal data including credit card information and other order files.
The company management is concerned about the overall security of its, network, systems, and data.
Project Objectives:
You have been hired as an expert consultant to conduct a security audit for the ACME Blue. You are asked to present the management with your security audit plan.
Deliverable:
The ACME management is expecting a 1-2 page report from you that addressed the project objective and includes the following:
Describe the security audit activities that you would implement.
Explain what software security analyzers and other tools you would you use for this audit. Why did you choose these tools? What information do you expect to obtain from using them?
What would specific items, object, an event in the ACME Blue infrastructure you audit?
The report must include a conclusion summarizing your findings. Do not copy and paste from the internet. Instead, provide APA style references to the original sources, so that the ACME Blue management can get more information.
Explanation / Answer
ACME MANAGEMNT:
Linux is one of the most used OS when it comes down to the servers. It is true that vulnerability in Linux are arising as the time passes. Hence, many big organizations are running down the Bounty programs to get them on the safer side and even a big leap in getting security for themselves.
Network Monitoring Using Security:
The Traffic monitoring is also an important concept as it can be used to increase the chances of being vulnerable as much time it takes to get less traffic. As, chances of being exploited with attacks such as DoS & DDoS attacks. The networking of the whole system is being done mostly on Linux so understanding Linux to attend the traffic in the system with full proof of vulnerability.
Linux Vulnerability:
Hence, this is how the linux security is exploited and with the help of the possible exploits and pitfalls in the system there are many hacks happening in the systems with Linux.
Exploiting The Vulnerabilities:
In Linux, there are penetration tester softwares that test the vulnerabilities and make the world aware of the security issues that are contained in the systems. The system will then get to know about the cyber security and getting into the facts of the applications is also very important.
The vulnerabilities that are pretty much available in the Internet and are exploited are as follows:
Hence, these are the vulnerabilities that are being indentified on the bigger scale in the market and are being exploited by many security professionals and hackers.
Methodologies:
The impact of the vulnerabilities on the organization may be very intense if not focused on. To keep the network running and fine we need to overcome these vulnerabilities and create patches for these vulnerabilities otherwise the impact of these vulnerabilities will be very immense.
Hence, these are the impacts of the vulnerabilities and how must one deal with these vulnerabilities.
Rate an upvote....Thankyou
Hope this helps....
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.