This website uses cookies to ensure you have the best experience. Learn more

Compromised Business Analysis Impact Lab #1

625 words - 3 pages

Logan W. Burroughs
CIS542 – Winter 2014
1-16-2014

Describe the business threats posed by each of the following situations and explain what its effect may be if a Web application is compromised:
1. A publicly traded retailer with retail outlets and online shopping/shipping.
a. Merging both in-store and online sales. In the event the web application is compromised anything from the inventory miscalculations to customer data being stolen could occur.
2. A small, private law firm’s website with forms for potential clients to complete, including name, address, contact number, and reason for scheduling an appointment.
b. With including the reason for scheduling appointment, in the event of a web breach customers’ legal or other personal information could be leaked.
3. A real estate appraisal company that provides online appraisals for a publicly traded financial institution’s residential-loan applicants. The bank sends all applicant ...view middle of the document...

5. A city government that allows people with parking tickets to pay the fines online using a credit card or online check.
e. Financial fraud or identity theft; customer information could be compromised including personal payment information. False payments could be made online.
6. A local residential-cleaning business with a website that acts as a company brochure; no forms of any type are located on the website.
f. This has no web application currently, which cause a loss of potentially new clients who prefer to make payments or appointments online.
7. A software development company that develops and licenses online shopping software to large corporations.
g. Large-scale identity and financial theft. Since this one company develops and licenses eCommerce software to large companies, if the main company is compromised it could lead to ALL of their clients being infiltrated as well.
8. A private, locally owned bank with a website that accepts loan applications online.
h. This could open many doors to identity theft and people having loans taken out in their name by someone else.
9. A local doctor’s office that keeps all patient information at the office, doesn’t share electronically with any entities, and doesn’t have a website or use any custom-developed software.
i. I do not see any web-based threats here.
10. An online-only retailer that sells athletic equipment using shopping-cart software that has been developed in-house and uses PayPal whenever a customer makes a purchase.
j. If the in-house developed shopping cart is not carefully debugged and tested there could be price mistakes between the site and the payment service PayPal. Quantity, price, or item mix ups could possibly occur, but since PayPal is a secure payment gateway, there is a minimal chance for financial or customer information leaks.

References
Ready.gov (2012). Business Impact Analysis | Ready.gov. Retrieved from http://www.ready.gov/business-impact-analysis
TLDP.org (n.d.). From DOS/Windows to Linux HOWTO : Files and Programs. Retrieved from http://www.tldp.org/HOWTO/DOS-Win-to-Linux-HOWTO-4.html
Ubuntu Manpage: tcpdump - dump traffic on a network. (n.d.). Retrieved from http://manpages.ubuntu.com/manpages/lucid/man8/tcpdump.8.html

Other Papers Like Compromised Business Analysis Impact Lab #1

Title Is Awesome Essay

1179 words - 5 pages      Access Control Policy Definition      Business Continuity—Business Impact Analysis (BIA) Policy Definition      Business Continuity & Disaster Recovery Policy Definition      Data Classification Standard & Encryption Policy Definition      Internet Ingress/Egress Traffic Policy Definition      Mandated Security Awareness Training Policy Definition      Production Data Backup Policy Definition      Remote Access Policy Definition

Itt Lab 6 Nt2580 Essay

954 words - 4 pages Office and branches) 13 HQ LAN/VoIP/IT Infrastructure Marketing and public relations 16 Marketing Analysis System Lab #6 Assessment Questions & Answers 1. What is the different between a risk analysis (RA) and a business impact analysis (BIA)? Risk analysis is often identifying the potential threats and the associated vulnerabilities to the organizations .Risk analysis doesn’t view the organization from the mission

Lab Validation Report

5252 words - 22 pages  expecting  faster,  more  impactful  results.  As  a  result,  business  intelligence  and  data  analytics  was  the   fifth  most  cited  response  among  the  top  2013  IT  priorities  reported  by  respondents  to  ESG’s  annual  IT  spending   intentions  survey.1   As  more  information  becomes  available  to  businesses

Information Systems Security

4584 words - 19 pages Microsoft® Baseline Security Analyzer (MBSA) Introduction Deliverables Hands-On Steps 53 53 55 63 64 54 Learning Objectives 53 Evaluation Criteria and Rubrics LAB #4 ASSESSMENT WORKSHEET iii 38351_FMxx.indd iii 8/1/12 12:48 PM iv Contents LAB #5 Perform Protocol Capture and Analysis Using Wireshark and NetWitness Investigator 67 Introduction Deliverables Hands-On Steps 67 67 69 80 81 68 Learning Objectives

Chapter 5

272 words - 2 pages level, and then you used NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing a complete packet capture, to review the same traffic at a consolidated level. Lab Assessment Questions & Answers 1. Why would a network administrator use Wireshark and NetWitness Investigator together? Wireshark is better for performing protocol analysis and Netwitness Investigator is best at performing protocol

Evidence Collection

2876 words - 12 pages pornography and e-mail spamming. A computer forensic expert ensures that the following rules are upheld during an investigation: • No possible evidence is damaged, destroyed, or compromised by the forensic procedures used to investigate the computer (preservation of evidence). • No possible computer malware is introduced to the computer being investigated during the analysis process (prevention of contamination of evidence). 1-4 Chapter

Lab Scientific Method

554 words - 3 pages genes are which? • What is the ratio that is most likely to be observed across all traits? When your lab report is complete, post it in Submitted Assignment files. Part 1: Using the lab animation, fill in the following data table to help you generate your hypothesis, outcomes, and analysis: Punnett Square P p

Management Information System

713 words - 3 pages business goals. You are to do an analysis of the business process by modeling how the business activities that form the patient journey within the health institution are done. Some of this activities include patient registration, Triage, Nursing Observation, Clinician Notes, Diagnosis, Lab, Radiology, payments etc. Other details include:- * What are the pros and cons of EMR systems? * How applicable/relevant is the System in managing the

Itt 255 Lab 6

3922 words - 16 pages ) Match Risks/Threats to Solutions Impact of a Data Classification Standard Conduct a Vulnerability Assessment Scan Using Nessus® Project Part 1: Multi-Layered Security Plan† Calculate the Window of Vulnerability Microsoft Environment Analysis Enable Windows Active Directory and User Access Controls Access Control Models Remote Access Control Policy Definition 2 1 Information Systems Security Fundamentals 1.2 1 1.3 1 Lab 2.1

Is4550 Week 5 Lab

1642 words - 7 pages workstations left unattended and securing against unauthorized physical access; and restricting access. 2. Business Continuity – Business Impact Analysis (BIA) Policy Definition: Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency. A BIA is an essential component of an organization's business

Community Health And Population C229

2844 words - 12 pages is an official form filled out for this with contact numbers, date of contraction, date of reporting. A disease surveillance is done for the community. Systemic collection, analysis, interpretation of the data and a specific plan of care is coordinated with all public health nurses. The county health department reports the suspected case to the Florida Department of Health Bureau of Immunizations. If the case is suspected after business

Related Essays

Apple, Inc. Business Analysis Part 1 Swot

1769 words - 8 pages Business Analysis Part 1: Apple, Inc. Apple is a highly innovated business that entered the business world making computers back in the 1980s. They ventured out in the 2000s making non-PC devices and by the spring of 2010 had a market capitalization of $220 billion dollars. As a mutual fund manager, I have performed a SWOT analysis to determine whether or not to invest in this company. I will identify internal and external stakeholders

Planners Lab Essay

302 words - 2 pages Planners lab Successful financial planning is a critical success factor for every organization. The Planners Lab (PL) is not restricted to financial planning, but this is a primary focus. Example applications include strategic planning, financial planning, capital budgeting, balanced scorecards, engineering project investment analysis, merger and acquisition analysis, and sales forecasting. Planners Lab models are written in an

Alter Essay

439 words - 2 pages • What would happen if a species within a population were suddenly split into 2 groups by an earthquake that creates a physical barrier like a canyon? When your lab report is complete – submit it in the classroom. Part I: Use the animated time progression of speciation to help you write up your lab report. Part II: Write a 1-page lab report using the following scientific method sections: • Purpose o Determine what will happen if a species

Troubleshooting Intervlan Routing And Host Configuration Issues

687 words - 3 pages original procedure? How can you tell that the lab activity implemented meets the business needs? Application and Analysis Below are some sample questions that will guide you as you complete this lab section. From the information given, can you develop a set of instructions to implement the solution in a small-to medium-sized network? What, if anything, would you change before applying the lab activity in a production (live) network? What