University | Teesside University (TU) |
Subject | Security Analyst |
Task
You should analyze the given systems focusing on the security aspects. Your work will consist not only in identifying existing vulnerabilities and misconfigurations but also in making an earnest effort to practically demonstrate how such vulnerabilities can be exploited. The report is intended for a technically knowledgeable audience, but it should be introduced by a short executive summary for a broader audience.
Although you are allowed to use automated tools, the company made a specific request to use whenever feasible manual (or scripted) examples in order to demonstrate the attacks, as they provide a clearer explanation of the vulnerability exploited.
Scenario
“EVC” is a manufacturer of components for electric vehicles. They used to run IT services in-house until 3 years ago when in a cost-cutting exercise the activities done by the IT department were outsourced to an external provider called “XPR”.
Therefore, the computers currently used by the company are set up, configured, and managed by the external provider. “EVC” still has a small IT department, which mostly maintains end-user applications. Additionally, the IT department also carries out a range of onsite interventions, sometimes under the guidance of “XPR”.
The IT department does not include any security specialists, but it has raised a concern regarding the security of the systems currently managed by “XPR”. They are worried about potentially vulnerable software installed on the systems despite updates being available for some time.
They raised the issue to the management, which initially ignored the concern. However, after a formal consultation with the worker’s representatives, they agreed that an independent audit should be carried out. They were convinced by the fact that the initial 4-year contract with “XPR” is going to expire in 12 months.
The company has agreed to appoint two security analysts, who will work independently. As one of the two auditors, you are asked to analyze several systems and make an assessment of their security. The systems provided are clones of existing ones and there is no concern of damage you could cause because of your analysis. You are only subject to a standard non-disclosure agreement (NDA).
Hire a Professional Essay & Assignment Writer for completing your Academic Assessments
Native Singapore Writers Team
- 100% Plagiarism-Free Essay
- Highest Satisfaction Rate
- Free Revision
- On-Time Delivery
We at Singapore Assignment Help provides top-notch cybersecurity & intelligence assignment help online to the students studying in TU. Our assignment help experts are well-equipped with all the topics related to security analyst and provide quality solutions at a reasonable rate. Our coursework writing services online at an affordable rate to help you secure good grades in this subject.
Looking for Plagiarism free Answers for your college/ university Assignments.
- PAC Research Proposal Report Assignment 1: Accounting and Finance Topics
- 7025CL Management Report Assignment: Investment Appraisal and Cash Budgeting – A Financial Feasibility Study for Gamiquest Corporation
- AWS Cloud Migration Assignment : FashionOnline Case Study for PDPA-Compliant Infrastructure
- Comparative Essay on Blake’s Moral Vision and Keats’s Aesthetic Ideal
- Essay on Marginalisation of Vulnerable Groups in Singapore Through a Sociological Lens
- 6WBS0034/6WBS0033 Assessment 2 Pdf: Evaluating Trade Dynamics and Financial Globalisation in Shaping Global Economic Patterns
- FILM1000 Essay Assignment 2025 Pdf: Unfolding Meaning Through Style in Billy Elliot SUSS
- MSMENV272 Case Study on Environmentally Sustainable Work Practices
- HRM331: Talent Management – Strategic Shift from the War for Talent to the Wealth of Talent
- Marginalised Populations – The Structural and Cultural Exclusion of People Experiencing Homelessness in Singapore