Executive Proposal For The Purchase Of Hackershield Professional Writing

PAGES
6
WORDS
1473
Cite
Related Topics:

Executive Leadership Team, Advanced Research Hackershield Security Testing Software

Today, security has become an integral part of information technology networks and Advanced Research is in need of an improved approach to its security precautions. The purpose of this executive proposal is to provide the company's executive leadership team with a description concerning the benefit of testing and identifying vulnerabilities before they are exploited by hackers through the use of Hackershield Security Testing Software, including a description of the application, its purpose and associated benefits in support of its purchase and implementation. Finally, a summary of the research and important findings concerning the benefits of Hackershield Security Testing Software together with recommendations for its purchase by Advanced Research are provided in the executive proposal's conclusion.

Review and Analysis

Description of Hackershield Security Testing Software

This application uses a proactive approach to information technology (IT) security by actively scanning, testing and identifying potential security-related problems. For instance, according to the software's vendor, "HackerShield performs daily security scans employing industry-standard, as well as advanced software and methodologies to scan, test, and identify security vulnerabilities" (Hackershield, 2015, para. 2). In addition, in an effort to standardize the terminology concerning corporate network vulnerabilities, Hackershield Security Testing Software also incorporates the Common Vulnerabilities and Exposures (CVE) list that assigns a number to each type of vulnerability that the software security product is used to detect (Group debates what's in a name, 2009). This application also creates a map of an IT network in order to develop an inventory of its constituent components, including servers, workstations and other IT devices (Ethical hacking and countermeasures: Attack phase, 2009). The purpose of these features is discussed further below.

The Purpose of Hackershield Security Testing Software

Software security systems that were state-of-the-art just a few years ago may be woefully inadequate to respond to the dynamic nature of the types of security threats that are arrayed against corporate IT networks. For instance, according to Piazza (2009), "Many Web applications, from complex online pages to simple Web forms, are rife with exploitable weaknesses, and malicious attackers are frequently and successfully using those holes to obtain access to whatever sensitive information may be inside the exploited database" (p. 87).

Therefore, the overarching purpose of Hackershield...

...

According to Gope and Kashem (2013), there are two primary goals for testing software in this fashion as follows:
To achieve adequate quality (debug testing) by probing software for defects so that these can be removed; and,

To assess existing quality (operational testing) to gain confidence that the software is reliable (p. 36).

The HackerShield Security Testing Software package includes a large database and dictionary that are used to simulate hacker attacks on designated network devices and identify any passwords that are vulnerable to hacking (Manzuik, 2015). This security application also scans each computer's internal configuration and operating systems to identify directories, users, and permissions and incorrectly configured files (Manzuik, 2015). This is an especially important attribute for Advanced Research. For instance, Piazza (2009) emphasizes that, "It is clear that any online business and any organization with a Web site is vulnerable to hackers who seek out Web application weak points to steal information or penetrate the inner workings of a network" (p. 88).

Following the completion of each scan, the Hackershield Security Testing Software produces a report formatted in HTML that can be exported to an ODBC database package as shown in Figure 1 below (Manzuik, 2015).

Figure 1. Representative Hackershield report

Source: http://windowsitpro.com/content/content/9206/screen_01.gif

According to Manzuik, "The report identifies each vulnerability or misconfiguration that the scanner found and provides instructions on how to eliminate each threat" (2015, para. 5). The HTML-formatted reports also provide corresponding links to relevant background data concerning associated security issues, including updates by BindView's expert consultants and security advisories from software vendors (Manzuik, 2015). This data is also depicted in graph form to facilitate identification of trends in security breaches to prioritize remedies (Manzuik, 2015). Scans can also be configured to run automatically at set time intervals and allows the customization of scan policies (Manzuik, 2015). In addition, this application provides the ability to automatically keep the system current with vendor-provided updates (Manzuik, 2015).

The Benefits of Hackershield Security Testing Software

There are numerous benefits that can accrue to the use of Hackershield Security Testing Software. For example, according…

Sources Used in Documents:

References

Ethical hacking and countermeasures: Attack phase. (2009). EC-Council: Cengage Learning.

Gao, K. (2013, March). What if your business is hacked. Information Today, 30(3), 13.

Gope, D. C. & Kashem, M. A. (2013, March). Software quality assurance development using Bayesian graphical model and safe growth model. American Academic & Scholarly Research Journal, 5(2), 35-39.

Group debates what's in a name. (2009, January). Security Management, 44(1), 36.
Hackershield. (2015). eCommerce Hackershield. Retrieved from https://www.ecommerce.com/hackershield/siteseal.html.
Manzuik, S. (2015). Hackershield 2.0. WindowsITPro. Retrieved from http://windowsit pro.com/security/hackershield-20.


Cite this Document:

"Executive Proposal For The Purchase Of Hackershield" (2015, December 03) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/executive-proposal-for-the-purchase-of-hackershield-2161116

"Executive Proposal For The Purchase Of Hackershield" 03 December 2015. Web.25 April. 2024. <
https://www.paperdue.com/essay/executive-proposal-for-the-purchase-of-hackershield-2161116>

"Executive Proposal For The Purchase Of Hackershield", 03 December 2015, Accessed.25 April. 2024,
https://www.paperdue.com/essay/executive-proposal-for-the-purchase-of-hackershield-2161116

Related Documents

Anonymous is one of the groups that can be seen as participating in this form of hacktivism, as is Wikileaks. Wikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false

They would sometimes be using the school curriculum as an excuse to hack pertinent information that are government or privately owned. At some point, these students would be challenging themselves if they will be able to create and send unnecessary information (such as computer viruses) to other computer systems. This will provide extreme joy and satisfaction for these students. However, the issue here lies on how can this be

Hacktivism Securing the Electronic Frontier Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities. Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by

Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a

Hacker Hacking, Web Usage and the Internet Hierarchy Computer hacking is perceived as a crime and is frequently motivated by economic interests such as the stealing of personal and credit information, or by ideological interests such as the disruption of a company's service or the acquisition of classified information from government or corporate sites. However, hacking is also quite frequently used as an instrument for the expression of political, philosophical and practical frustrations.

Hacker Culture and Mitigation in the International Systems The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance