Would someone be able to create this research paper?
Would someone be able to create this research paper?
For Assignment purposes, select a multi-layered (presentation layer, business layer, and database layer) Web-based open source project in place of the software company’s Web-based product. In place of the open source project, if you are familiar with another Web-based system that meets the requirements, then discuss using it with your instructor.
Assume that the presentation layer resides on a dedicated server in the company’s DMZ. The other two layers of the software are behind the corporate firewall and can reside on one or two dedicated servers. The Web application is accessible from the Internet and is browser based. Firefox, Chrome, Internet Explorer, and Safari are the supported browsers.
You will conduct a cyber attack surface analysis on the system/application you selected. Focus your analysis from an external cyber attack point of view. It is not necessary to focus on end user cyber attacks (social engineering attacks, etc.). You will define the cyber attack surface (do not forget to consider the O/S’s used and Web server), you will identify and map the cyber attack vectors, categorize what was identified, and pick at least three use-cases that validate your understanding of the attack surface. Finally, determine if the attack surface can be reduced. All of this analysis will help the CCSO understand the cyber attack surface for the product. In an effort to help with your analysis, you can use an open source or commercially available attack surface analyzer to help with your analysis. Finally, this Assignment should also include a graphical representation of the attack surface with descriptions (Consider using Visio for this part of the Assignment).
Your analysis paper should be at least 5–6 pages of content (exclusive of cover sheet etc.), using Times New Roman font style, 12pt, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s). Be sure to document your content with proper APA in text citations that match your reference list.
You should support your assertions with three credible sources. You may use peer-reviewed articles, trade magazine articles, or IT research company (Gartner, Forrester, etc.) reports to support your research
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


