Free Essay

Executive Proposal

In:

Submitted By Magicman247
Words 1213
Pages 5
To: | The executive management team of Advanced Research (AR), Reston, VA | From: | Samuel Majekodunmi, IT Manager. | Date: | Aug. 30th 2015 | Subject: | The Reasons Advanced Research needs Kali Linux to Enhance and Test Security. | | Purpose | |

The purpose of this proposal is the present the executive team of Advance Research (AR) a solution to recent strings of security breaches. The goal of the proposal is to persuade the executive team of Advanced Research to invest personal for the sole purpose of constant testing of network security and vulnerability; therefore ensure AR’s safety of intellectual property. Table of Contents Executive Summary……………………………………………………………………….2 Introduction………………………………………………………………………………..2 Recommendations…………………………………………………………………………3 Budget……………………………………………………………………………………...4 References………………………………………………………………………………….4

Executive Summary

Advanced Research (AR) is on its way to becoming a major player in the medical research and development industry. However, suspicion that the corporate network infiltrated from unauthorized sources more than once, indicated the lack of solid security measures. The false allegations of unethical research and development practices are proof of such accesses. Despite the security troubles and false allegations, AR has experienced a 40% increase in business and as result of the increase AR has hires more stuff. The increase traffic is another indication that AR needs a sure and effective method to securing employee’s credential and devices. AR’s innovative research and development information is paramount to its continued success as a company. AR must enhance every security measure to meet the increase in business and procurement of new tools, personal and advance software for the sole purpose of testing the vulnerabilities in our network. The software should be able to test for the following attacks: * Denial of Service (DoS) * Cross Site Scripting (XSS) * Authentication Bypass * Directory Traversal * Session Management * SQL injection * Database Attacks * Password Attacks * Firewall/Router Attacks * Operating System Attacks
Introduction
Advanced Research has been the victim of cybercrime by hackers, whom have attempted to ruin the reputation of AR. The recent strings of breaches propagated against our network, is indication of our network vulnerabilities. In order for continual to succeed in the area of research, AR must continue testing for vulnerabilities that make access to intellectual properties possible. In other to test the vulnerabilities of the network, we must attempt to hack and penetrate our network. For security, professionals around the world will recommend Kali Linux because it comes with slew of robust tools to conduct a number of assessments and tests for the purpose to enhance security, reduce, and pinpointing vulnerabilities. Perhaps, the most important tool available is Metasploit Framework, which is an open-source development platform for creating security tools and exploits. The Metasploit framework “is the gold standard in the penetration testing tools industry. Metasploit earned a reputation as one of the most advanced frameworks on the market and the worlds most used software for this purpose. Metasploit is a collaboration of the open source community and Rapid 7; one outcome of this is the Metasploit Project, which is a security project focused on delivering information about security vulnerabilities and helps penetration testing and Intrusion detection.” (Walker, 2015) The framework allows users to configure exploit modules and test systems against attack. If the attack succeeds, a shell script opens, allowing the user to interact with the payload. The Metasploit framework written in the Ruby programming language and includes components written in C and assembler, which is ideal when applying script, develop to perform particular tasks.
Recommendations
In order to meet our security threats head on, recommendation is to use open source Software call Kali Linux. Kali Linux formally known as Backtracks 5 r3 comes with more updated tools that conduct a number of assessments and tests for the purpose to enhance security and finding vulnerabilities. Kali Linux is fully equipped with open source programs that are free to use. Exploitation are Advance Research number 1 problem, with the Exploitation tool at our disposal with can conduct Network, web, database, wireless, social, physical, open source exploitation to assess if our infrastructure or network is vulnerable and implement changes. One of the biggest attacks are on the network and under the Network Exploitation Tools is the Cisco Attacks which allows us to check for vulnerabilities on routers, Netgear-telnet-enable which target Netgear router set to listen on the network and Metasploit Framework to run while in the Backtrack module. We are able to conduct Vulnerability Assessment on networks, web applications, and databases. In addition to conducting all the previously mentioned assessment, the vulnerability assessment come with automated programs such as OpenVAS (The Open Vulnerability Assessment System) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. The actual security scanner accompanied with a daily updated feed of Network Vulnerability Tests (NVTs) for services and open port that do not need to run. Exploitation Tools will allow for the conduct of exploitation test on service and ports. Therefore, identifying which service is vulnerable to attacks. Kali Linux will allow monitoring right and privileges a breeze and issues access controls to personnel with the appropriate authority. Reverse Engineering allows us to investigate were an attack was propagated so as to take the appropriate action against theft or intellectual properties. “Stress Testing tools are used to evaluate how much data a system can handle. Undesired outcomes could be obtained from overloading systems such as causing a device controlling network communication to open all communication channels or a system shutting down (also known as a Denial of Service attack).” (Lakhami, 2013) Network, VOIP, and WLAN are a few Stress Testing tools that allow an examination of the network both wired and wireless in an event where there is increased traffic. Under the stress test, we are able to stimulate a number of attacks that rick havoc on networks (i.e. ping flood, and denial of service attacks etc.). Anti-virus Forensics and Network Forensics are a few tool that are under the Forensics tool, which are there to find violators and hacker activity were virus are deployed to create backdoors in the system.

Budget

Kali Linux is a great tool and it is essential to implementing a well-rounded security program. Since Kali Linux is open-source, it cost nothing to install which will save AR a substantial amount of money. In addition, Kali Linux runs off the Debian platform, which means it is very solid once installed with low maintenance. AR will need to hire talented Kali Linux administrators to conduct daily and weekly security tasks and as a result will pay those administrators salary. The average for a Linux administrator is $79,000 to $100,000 per year, with minimal in compare contracting to a security firm, who annual fees range from $600,000 to $1,000,000 depending on the size of the client.

References
Lakhami, A. (2013, Nov 26). The Ultimate Installation Guide for Kali Linux. Retrieved from www.drchaos.com: http://www.drchaos.com/the-ultimate-installation-guide-for-kali-linux/
N/A. (2015, Aug 30). Metasploit Unleashed. Retrieved from https://www.offensive-security.com/: https://www.offensive-security.com/metasploit-unleashed/introduction/
Walker, J. (2015, May 15 ). blog.monitor.us. Retrieved from Top 7 penetration testing tools for the small business.: http://blog.monitor.us/2015/05/top-7-penetration-testing-tools-for-the-small-business/

Similar Documents

Free Essay

Ceh Executive Proposal

...Executive Proposal CMIT 321 Certified Ethical Hacking Kowaine Baker University of Maryland University College Executive Proposal The Solarwinds software was developed to assist in management and addressing of security exploits, real-time network health and change management among other areas of today’s ever changing Information Technology (IT) data environment. This software assists the security manager in safeguarding vital business data through the compilation of network device information and real-time awareness of network health, firewall configuration and patch management with deployment. The software is modular and can be configured to meet the needs of the organization in which it supports while minimizing service interruptions which lead to the loss of productivity. Solarwinds offers a multitude of modules that range from configuration management to help desk trend analysis and firewall management. This is a non-platform dependent software solution which can manage firewalls and devices for proper patch management. This solution can be configured by the most novice IT professional while not breaking the bank. Its scalability can support anywhere from 10 users to many hundred users. The Solarwinds software solution can be a great addition to any network security solution. The benefits you will be getting from this software cover a large spectrum of security hardening techniques from the firewall configuration and management to end user patch management. Solarwinds...

Words: 1221 - Pages: 5

Premium Essay

Advanced Research Executive Proposal

...Advanced research | Tenable Nessus Security Center | Executive Proposal | | James Ellis | 2/21/2015 | [ The following proposal will outline an effective solution for Advanced Research to incorporate in their security audits and assessments. ] | Executive Summary Security testing software is a very important entity for many organizations as it provides security to a company’s network by identifying and testing vulnerabilities before potential hackers can exploit them. Advanced Research has been the victim of cybercriminal efforts to take intellectual assets and sell it to their competitors. It is assumed that our network of corporate documents has been infiltrated by illegal sources more than once. The amount of malware being released to the Internet and infiltrating corporate networks is escalating at an alarming, exponential pace that is doubling every year, (Kaspersky, 2014). Even more disconcerting is that in spite of software vendors efforts to provide patches for vulnerabilities in an expeditious manner as they are discovered, the number of vulnerabilities discovered on existing systems has also increased exponentially, (Kaspersky, 2014). In addition, over 41% of all computers connected to a network were attacked at least once, and this number does not account for the number of attacks to Android mobile devices for which over 98% of all malware is designed to attack, (Kaspersky, 2014). The following is a plan for implementation and purchase of the Tenable...

Words: 1577 - Pages: 7

Premium Essay

Executive Summary Proposal Sample

...Executive Summary “Taste the Fun of Dining” The Meal Deal is a world class catering company that serves both business and private clients in the Philippine market. Established in 2007, the company has operated a catering kitchen and specialized in full-service catering and event planning for upscale events in the country. It is located in the booming, and rapidly expanding Mansions, Makati City. The Meal Deal offers a wide variety and affordable food options for customers without sacrificing the taste, aroma and food presentation of every meal. The menu will be inspired from different region's specialties and appeal to a diverse clientele. It has built up their meals and services beyond each and every customer’s needs. They aim to satisfy not only your immediate requirements but also your subconscious desires to every food. The company’s service is known to be relaxed, very friendly and efficient. Our management team is comprised of individuals whose backgrounds consist of 50 years experience in food, restaurant and hotel, bartending, catering, management, finance, and marketing. The company has years of experience in the catering business and knows what an important client wants and needs. We will have a large specialized menu for customers to select from, and we will offer full catering service providing everything from table settings to the dessert. We anticipate our total sales allocation to be 85% restaurant sales and 15% catering sales. The...

Words: 253 - Pages: 2

Premium Essay

Metasploit Vulnerability Scanner Executive Proposal

...Metasploit Vulnerability Scanner Executive Proposal Paul Dubuque Table of Contents Page 3 Executive Summary Page 5 Background Information Page 6 Recommended Product Page 7 Product Capabilities Page 10 Cost and Training Page 11 References Page 13 Product Reviews Executive Summary To: Advanced Research Corporation Mr. J. Smith, CEO; Ms. S. Long, V.P. Mr. W Donaldson, CCO; Mr. A. Gramer, CCO & Mr. B. Schuler, CFO CC. Ms. K. Young, MR. G. Holdsoth From: P. Dubuque, IT Manager Advance Research Corporation (ARC) has grown rapidly during the last five years and has been very successful in developing new and innovative devices and medicines for the health care industry. ARC has expanded to two locations, New York, NY and Reston, VA which has led to an expanded computer network in support of business communications and research. ARC has been the victim of cyber-attacks on its network and web site, as well as false alegations of unethical practices. ARC’s network is growing, with over two thousand devices currently and reaching from VA to NY. ARC needs to ensure better security of communications, intellectual property (IP) and public image, all of which affect ARC’s reputation with the public and investors. ARC has previously limited information technology (IT) expenditures to desktop computers and network infrastructure hardware such as routers, firewalls and servers. It is imperative that ARC considers information security (IS) and begins to invest in products...

Words: 2593 - Pages: 11

Premium Essay

Exchanges with Industry Before Receipt of Proposals (4-4)

...Exchanges With Industry Before Receipt of Proposals (4-4) Part 15 of the Federal Acquisition Regulations (FAR) “prescribes [the] policies and procedures governing competitive and noncompetitive negotiated acquisitions.” One component of negotiated acquisitions that occurs early in the acquisition process is the solicitation of proposals. FAR 15.201, titled, “Exchanges with Industry before Receipt of Proposals,” regulates the type and manner of communications, also sometimes referred to as exchanges, which can – and cannot – take place between the Government and potential suppliers prior to the receipt of a potential supplier’s proposal and the subsequent award of a contract. This paper will address a few of the various types and formats of exchanges that might occur between the Government and potential suppliers prior to the Government’s receipt of proposals, and the manner in which some of these exchanges are to occur; some of the legal, regulatory, and logistical considerations that a Program Manager, Contracting Officer, or other Government participant in the acquisition process might need to be mindful of when conducting discussions; and the diligence and care that must be utilized by the Government team members when conducting exchanges with potential suppliers before the receipt of proposals in order to avoid issues that may arise later in the procurement process. Exchanges of information can take place either before, after, or both before and after the official...

Words: 2497 - Pages: 10

Premium Essay

Natural Cereals Case

...implemented Sally’s proposal, our market share increased three points, which she definitely deserves credit for. However, her proposal has led to some active criticism from the public which has left our group manager Tom Miller displeased because of how valuable this proposal is to our Natural Cereals division. Sally’s proposal included a limited health message to the high fiber content in our bran cereals. She indicated in a very cautious way that food high in fiber has been associated with studies to lower rates of some forms of cancer; however, she did not go about saying that our bran cereals had more bran than other competing bran cereals. She also went about featuring our new “Re-sealable Pack,” which allows the inside bag to be resealed for freshness, and included a 35 cent coupon toward the next purchase of a product of Natural Cereal. Although she believed her proposal avoided deception to our consumers, one key criticism we have received for Sally’s efforts is that we jumped on the company bandwagon that makes often misleading or incomplete health claims. Tom believes we cannot afford criticism, so he asked me to step in and provide my own proposal. I support many of the ideas Sally and Joe have proposed, however, I feel there are still a few mishaps and missing pieces in the proposal. I believe these mistakes and missing pieces ultimately led to the difference in whether the public would have supported Sally’s proposal or not. For my proposal, I truly feel that...

Words: 1331 - Pages: 6

Free Essay

Devry Engl 216 Complete Lourse-Latest 2015 December

...Devry ENGL 216 Complete Lourse-Latest 2015 December (All Discussions All Homework And Complete Course Project) IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load http://www.hwspeed.com/Devry-ENGL-216-Complete-Lourse-Latest-2015-December-111325874.htm?categoryId=-1 IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM Question week 1 Technical Communication at Work (graded) As you read Chapter 1, you will learn that communication skills are critical in the workplace and that technical writing is used in virtually every work environment. For this discussion, locate a technical document from your workplace or from home or the Internet, preferably one that might be found in your career field. Note that Figure 1-1 (page 4) provides a list of technical communication examples. Using the five goals and features of technical communication listed in the textbook (page 4), describe how the document addresses these characteristics. Then, discuss whether or not you feel the document is successful in its overall goal. Provide examples from the document to illustrate. If possible, share the document by posting a link or a PDF of the sample used. Audience Culture and Analysis (graded) As our text states, “one cardinal rule governs all on-the-job writing: Write for your reader, not for yourself” (page 41). This requires a solid audience analysis. As part of this analysis, you must also consider the audience's cultural...

Words: 3667 - Pages: 15

Premium Essay

Jennifer Child

...Executive Summary A request for a proposal was set by Jennifer Childs, Manager of a mid-size pharmaceutical company, to her three General Managers to propose on the reinvestment of an additional profit of $2,000,000 into the company. She has strained that the proposal should lead to a reduction of cost to the company and or increase in sales. The money would be allocated to one or more of the affected areas. Proposed areas to improve on are: * The Product development department needs upgrading in more laboratory equipment and scientists but the costs involved could absorbed the whole profit amount * Production department needs to be restructured by using employee teams. This could be a good idea, the reasons are as follows: * Suggestions made by employees could be implemented * Cost not too much if work spread over a period of time The only problem we foresee is that Tyler should convinced Jennifer as the things that her father built, weigh up very high for her. * Operational department needs upgrading. Computer equipment can`t handle the volume of transactions – this would require buying new software but this could led to a loss of disruption to the legacy system. It would be suggested that this project being breakdown into phases. * A proposal was made by the Marketing manager to increase his budget to employ more sales representatives, rather than allocating funds to projects as he believe that this will increase sales. What needs to be taken...

Words: 1614 - Pages: 7

Premium Essay

Business Proposal

...PERIOD: October 2012- January 2013 Semester LECTURER SETTING ASSESSMENT: - Rajendra Kumar & Tatiana Pavlovsky DATE ASSESSMENT SET AND LOADED ON TO STUDENT PORTAL:- 10/2011 DATE ASSESSMENT TO BE COMPLETED AND SUBMITTTED:- Individual presentation on & Course work submission on20th of December ---------------------------------------------------------------------------------------------------------------- Assessment Type: [E.G. Examination: Assignment: Presentation: Integrative Case Study: Business Development Proposal: Dissertation] “Individual Presentation (20%) and Individual Coursework (80%) ----------------------------------------------------------------------------------------------------------------------- Indicative Assessment Requirements for the Module;- Individual Presentation and supporting documentation ( Students are expected to do individual presentation ( five power point slides) and submit a new business proposal -- Maximum Word Limit and Assessment weighting for each aspect within the assessment: Individual presentation: maximum 5 Power Point Slides (deemed to be equivalent to 1000 words); Assessment Weighting 20%. Individual assessment contribution (an individual set of supporting documentation from each student equivalent to 6000 words absolute maximum); Assessment Weighting 80% ----------------------------------------------------------------------------------------------------------------------- Description of...

Words: 996 - Pages: 4

Premium Essay

User Manual Critique

...creating proposals: 2013 table of contents executive summary 1 back ground information 2 problem and objectives 3 research methodology 4 estimates of cost and schedule 6 qualification of researcher 8 appendix 9 executive summary automating to meet the needs of jump inc. Construction company Proposals are extremely important tools in construction, sales and marketing efforts but they also pose some serious challenges. These are some of the specific problems our company is facing Inefficient delivery of information where and when it’s needed Lack of tools to help construction sales people to work productively Difficulty in completing and delivering quality proposals quickly Construction sales people are experiencing too much desk time and not enough face time as they wrestle with the challenge of preparing proactive proposals Inconsistent looking proposals that contain conflicting and sometimes incorrect information The main goal of this project is to research a specific need expressed by members of the Proposal Development Group and Sales Department, that is the need for an industry specific Proposal Software Program. As outlined in the proposal, this is to be accomplished through significant interaction between the researchers, Information Management department and experts in the Proposal Development Group and Sales Department. This type of cooperative agreement is seen as fundamental to the success of all projects. Background information the positive impact of a proposal writer...

Words: 1397 - Pages: 6

Premium Essay

Test

...Request for Proposal  UK‐1357‐14  Proposal Due Date – 04/17/14      Environmental Health & Safety Software‐Based  Research Facilities Inspection and  Recordkeeping System  An Equal Opportunity University  REQUEST FOR PROPOSAL (RFP) ATTENTION: This is not an order. Read all instructions, terms and conditions carefully. PROPOSAL NO.: Issue Date: UK-1357-14 RETURN ORIGINAL COPY OF PROPOSAL TO: 3/20/2014 UNIVERSITY OF KENTUCKY Environmental Health & Safety SoftwarePURCHASING DIVISION Based Research Facilities Inspection and 411 S LIMESTONE Title: Recordkeeping System ROOM 322 PETERSON SERVICE BLDG. Purchasing Officer: Joyce Holmberg LEXINGTON, KY 40506-0005 Phone: 859-257-9104 IMPORTANT: PROPOSALS MUST BE RECEIVED BY: April 17, 2014 @ 3 P.M. LEXINGTON, KY TIME. 1. NOTICE OF REQUIREMENTS The University’s General Terms and Conditions and Instructions to Bidders, viewable at www.uky.edu/Purchasing/terms.htm, apply to this RFP. When the RFP includes construction services, the University’s General Conditions for Construction and Instructions to Bidders, viewable at www.uky.edu/Purchasing/ccphome.htm, apply to the RFP. Contracts resulting from this RFP must be governed by and in accordance with the laws of the Commonwealth of Kentucky. Any agreement or collusion among offerors or prospective offerors, which restrains, tends to restrain, or is reasonably calculated to restrain competition by agreement to bid at a fixed price or to refrain from offering, or otherwise, is prohibited...

Words: 10677 - Pages: 43

Free Essay

Business Plan

...Consulting Case Memo -- Outline Executive Summary While this section appears first, it should actually be the last thing you write. * The executive summary should be no more than one page. * Executive summaries are not “introductions.” They do not provide background. * Everything discussed in the executive summary should be explained in greater detail in the body of the memo. * If the only thing someone reads is your executive summary, your reader should have a good understanding of the problem, your proposal, the most important cost(s), and the most important benefit(s). Problem Statement Identify the problem in business terms. State clearly why the owner, president, or CEO should care about addressing the problem you’ve identified. Proposed Solution Identify the one most important action the company or organization needs to take to address the problem. Be as specific as possible in describing your solution. Costs of the Proposal Be as inclusive as possible when thinking about costs. Consider things like opportunity costs and the impact of the proposed change on the organization’s culture in addition to the more obvious financial costs. Identify every possible objection to your proposal. Why hasn’t the company already taken this step? The quickest way to have your recommendation rejected is to hear an objection to which you must reply, “I hadn’t thought of that.” Benefits of the Proposal How will your specific proposal address the problem you’ve identified...

Words: 293 - Pages: 2

Premium Essay

Boeing 7e7

...Existing Schedule | |Proposed Schedule | | | |25 June 2011 8:00 AM -11:00 AM and 1:00 PM – 3:00 PM |5 |25 June 2011 8:00 AM -12:00 AM and 1:00 PM – 4:00 PM |7 | |02 July 2011 8:00 AM -11:00 AM and 1:00 PM – 3:00 PM |5 | | | |09 July 2011 8:00 AM -11:00 AM and 1:00 PM – 3:00 PM |5 |09 July 2011 8:00 AM -12:00 AM and 1:00 PM – 5:00 PM |8 | |16 July 2011 8:00 AM -11:00 AM and 1:00 PM – 3:00 PM |5 | | | |23 July 2011 8:00 AM -11:00 AM and 1:00 PM – 3:00 PM |5 |23 July 2011 8:00 AM -12:00 AM and 1:00 PM – 4:00 PM |7 | |30 July 2011 8:00 AM -11:00 AM and 1:00 PM – 3:00 PM |5 |30 July 2011 8:00 AM -12:00 AM and 1:00 PM – 5:00 PM |8 | | |30 hours | ...

Words: 1197 - Pages: 5

Free Essay

Bus 505 Assignment 5 Proposal Presentation

...BUS 505 Assignment 5 Proposal Presentation To purchase this visit here: http://mindsblow.us/question_des/BUS505Assignment5ProposalPresentation/2784 Contact us at: help@mindblows.us BUS 505 Assignment 5 Proposal Presentation Due Week 10 and worth 250 points The procuring agency requires an oral presentation as part of the proposal response.Create a presentation in a common format (PowerPoint or a similar program) with a minimum of twenty (20) slides and corresponding speaker notes in which you: 1. Create an Executive Summary that supports your firms proposal projection to successfully enter the contract. 2. Discuss the support that the agency is proposing the firm to acquire in entering the contract. 3. Provide the reliability plan for the firms capability in entering the contract. 4. Prepare a conclusion based on the firms projected performance in entering the contracts projected time frame. 5. Provide an action plan using the cost estimate and selected contract type as a finalization of the firms conclusion in the solicitation process. 6. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resourcesYour assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides, citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover...

Words: 1053 - Pages: 5

Premium Essay

Enterprise It at Cisco

...1. Executive Summary of the Case This case study goes through the evolution of IT governance at Cisco and the related project management. This case is a classic example of the result of a decentralized governance of business units. What happened to CISCO due to the decentralized governance, how the business processes were modified to overcome the chaos created by the decentralized governance and how the employees and management reacted to this change in CISCO’s business governance? This case clearly illustrates the effect of a totally decentralized governance and how changing to a centralized governance leads to unrest and resistance. It also illustrates how the cultural/managerial change effects the business decisions needed to be made by a company to achieve success. Essentially, the case shows that IT governance must be aligned with business activities and tie all functions together to support the company’s strategy. 2. Problem Statement Will BPOC give a go-ahead for the proposal that the customer advocacy group was proposing? The proposal was to build a state-of-the-art customer interaction network that would centralize all incoming calls into a globally managed set of contact centers. Though this is a potentially valuable project, CISCO’s new centralized governance means that the customer advocacy group needs to get an approval from the BPOC. Will the BPOC realize the potential? Will it support the project and commit to a full cross-border and cross-functional implementation...

Words: 1038 - Pages: 5