Answer & Explanation:Based on the file attached information. write a report outlining the steps you should take before beginning penetration tests of the Woeson Books company. Research the laws applying to all states where the company has locations, and be sure to reference any federal laws that might apply to what you’ve been contracted to do. You need to provide the project plan written for Woeson’s President on how you’d conduct your testing, it’s scope, and the laws or regulations you need to follow. It should not include any findings on their security issues or how they should mitigate their risksEthical hacking.docx
ethical_hacking.docx
Unformatted Attachment Preview
Hello! My name is Derrick, and I’m a Cybersecurity specialist. Today, I have a challenging case for you to
help me with. Woeson Books, a new and used bookstore, has recently had some issues with its website.
They have had some security violations and are now rethinking their entire IT infrastructure. Let’s learn
a little about Woeson Books’ locations, employees, and IT infrastructure. Woeson Books is
headquartered in Syracuse, New York. The main office is located in a suburb of Syracuse, so physical
security is not a major concern. The company employs about 250 people in four cities. Their branches
are located in Redmond, Washington; Galveston, Texas; and Chicago, Illinois. Woeson’s e-commerce
website has recently been compromised. Hackers were able to access important customer information
including credit card numbers, account numbers, book orders, and addresses. But before we can assess
Woeson’s situation, I want to tell you about their IT infrastructure. Woeson primarily uses Microsoft
servers and PCs with a few Mac computers used to perform design work. They use Active Directory;
have an IIS web server for their Internet website, and two Microsoft Exchange servers to process their
corporate email. They also have four servers that they use as file shares (one for each office). Woeson
also has four servers that are used for housing their internal billing, inventory, CRM, and employee
applications. In addition, they have a training server and 5 MS SQL backend database servers. Here are
more specifics about each of these areas. • There are 20 Windows 2008 servers in the main office,
twelve of which are virtualized on three physical servers. • System updates and patches are run from the
main office. Most systems get Microsoft updates once a month, but some are missed. Also, most third
party products (e.g., Adobe PDF & Flash) are not kept up to date. • Each satellite office has 3-4 severs for
storing files and running local applications. • Each employee has a desktop or laptop PC running
Windows 7. HR personnel have laptops for conducting interviews. Their network sits behind a gateway
router and firewall. Antivirus is in use, but is not automatically updated across all the company PCs. They
use Windows Server Update Services (WSUS) to update Windows servers and client PCs, but similar to
antivirus software, not everything gets updated regularly. Employees often work remotely and only use
their logon and password to gain access to the corporate systems. Also, Woeson outsources their email
spam and all human resource applications to two separate third-party companies. The IT department at
Woeson Books has six full time employees, including a director of IT. One of the five full time employees
works IT security for the company on a part time basis. Due to the lack of dedicated security staff at
headquarters, each location has become quite autonomous in their security considerations, which has
led to mixed results in the level of security at each location. Now, the owners of Woeson Books know
that their IT infrastructure and organization have some known issues. First, a number of PCs and office
equipment have been stolen out of the main office in Syracuse. Second, two employees recently left
Woeson Books and went to their biggest competitor, Real Books. The ex-employees just landed a
contract with Woeson’s largest account, a bookstore for a large University. Third, it is Woeson Books’
policy to let the data owners decide whether to secure or not to secure their data files, documents, or
folders. Many do NOT secure their files, while some password-protect them, so only they have access.
There have been rumors that customer data and intellectual property have been lost. Fourth, vendors
are allowed to access the site and computers without authorization and supervision of a Woeson Books
employee. Finally, onsite staff at each location provides IT support part time along with their other
responsibilities. The onsite staff does password requests by giving out the generic password
“Orange2012”. As an independent cybersecurity professional, what holes do you see? How can you help
Woeson get on track with their cybersecurity? Refer to your assignment sheet in the weekly assignment
folder. Be sure to follow the directions carefully and contact your instructor with any questions. Good
luck!
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more