Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Hands-On Project 1-3: Implementing a Strategy You have been hired as the securit

ID: 3716178 • Letter: H

Question

Hands-On Project 1-3: Implementing a Strategy You have been hired as the security professional in your current work or school environment. Your department has experienced a recent breach within its database architecture. Your manager has delegated you to lead an effort to eliminate threats from the database environment. Based on the results from your assessment, five priority threats have been identified. Changes in policy, procedure, and design need to take effect in order to ensure protection from these threats. Using the five priority threats you identified in Hands-On Project 1-1, create a plan for implementation. Your plan for implementation should include the following: ? The phases in which you intend to implement the project ? The cost of the implementation, including a list of all new firmware and software to be purchased as well as training costs

The plan for communicating these changes to network users

The plan for training network users on changes, if necessary

The time frame for implementations The time of day that the implementations will occur

The testing strategy

Explanation / Answer

Protection of Database Environment:

Database includes a bunch of clients’ private information. The accounts of costumer are stockpiled on the secondary devices in database may be confidential and secret data, therefore offering some prudence is obligatory.

A database associated with company may also incorporate the company details, project details, which if seep out may turn out to be hazard to the clients and business entities.

Five priority threats have been identified.

Social Engineering specify to a emotional supervision of workforce of the company to carry out actions that lead to indirect revelation of association’s confidential information.

Phishing attack creates an imposter website that looks similar to original website that whips private data during user login.

Port scanning attacker thrusts a batch of pings to all available ports to locate which port numbers are open and unsecure.

Whaling is similar to Phishing attack totally overwhelmed at directors otherwise other high profile inside a commerce body.

Spoofing - It is a process where an attacker impersonates somebody, and tackle as an additional by counterfeit the details with grounds of illegal access.

Thwarting attacks

PHASES FOR PROJECT IMPLMENTATION:
A typical project implementation includes the following phases. They are:

Analysis/Requirement Phase: The functional and non-functional requirements are gathered for a project build up. It focuses on various parameters such as workforce, financial, resources etc.

Design Phase:In this phase, the prototype is build and showcased to the clients. Approval of prototype/further modifications are suggested by the Clients.

Development Phase: The design in put into practice via various codes/programs to perform the desired task.

Integration & Debugging: Once the individual models/units are developed, they are integrated (combined) and tested for their efficient working. Any errors if crept during programming will be removed through debugging tools.

Deployment & Maintenance: The product is put into practice to perform the task. The service of maintenance will be given by the software company as per the terms and conditions over a limited amount of times such as software patches/updates etc.