Ceh Executive Proposal

In: Science

Submitted By kowainb
Words 1221
Pages 5
Executive Proposal
CMIT 321
Certified Ethical Hacking
Kowaine Baker
University of Maryland University College

Executive Proposal
The Solarwinds software was developed to assist in management and addressing of security exploits, real-time network health and change management among other areas of today’s ever changing Information Technology (IT) data environment. This software assists the security manager in safeguarding vital business data through the compilation of network device information and real-time awareness of network health, firewall configuration and patch management with deployment. The software is modular and can be configured to meet the needs of the organization in which it supports while minimizing service interruptions which lead to the loss of productivity. Solarwinds offers a multitude of modules that range from configuration management to help desk trend analysis and firewall management. This is a non-platform dependent software solution which can manage firewalls and devices for proper patch management. This solution can be configured by the most novice IT professional while not breaking the bank. Its scalability can support anywhere from 10 users to many hundred users.
The Solarwinds software solution can be a great addition to any network security solution. The benefits you will be getting from this software cover a large spectrum of security hardening techniques from the firewall configuration and management to end user patch management. Solarwinds modularity contributes to its capability to fulfill many security requirements. Solarwinds offers a scalable security information and events manager (SIEM) console module. The SIEM module will enhance the capability to maintain real-time situational awareness through alerts and active monitoring. It will allow the prioritization, management and response to security incidents in a manner…...

Similar Documents

It Proposal

...elow is a typical business proposal template taken from one of the Proposal Packs available from my favorite proposal tools site, ProposalKit.com. These stand-alone Proposal Packs were created for just about any type of proposal you can imagine: business proposals, grant proposals, technical proposals, project proposals, sales proposals, and many more. They are stand-alone sets of proposal templates designed using industry standard guidelines. Each Proposal Pack includes a large collection of fully-formatted downloadable MS-Word templates with layout and graphics already done. You just fill in the blanks and easily create business proposals, from 3-pagers to full-blown 100-pagers. When I first discovered these ProposalKit.com. Proposal Packs, a part of me wanted to weep! Where were these high-quality, real-life proposal templates when I needed them over the years? Had I had access to these Proposal Packs years ago, and some of the related materials carried by ProposalKit.com, I certainly would have saved a lot of time, money, energy, and aggravation. (... and so would have many of my clients). Here are a few points that impressed me about this sample template: It is a professional looking document created for an actual real-life proposal situation. Proposal is fully formatted in final submission form with layout and graphics included. Includes a very good one-page Executive Summary that focuses on solutions and benefits for the Client. The body...

Words: 385 - Pages: 2


...Proposal to: Mayor and Chief Medical Officer Proposal Title: Nursing Care Center By: Nightingale Nurse Recruit, Nursing Director: Anesta Parris; Medical Information Technology Directors: Dawn Froemel & Ernestina Ayon; Laboratory Services Director: Andrea Dabney April 12, 2013 Introduction Please accept this proposal for the new Riverview Hospital Nursing Care Center. Key health care directors have contributed to this plan. Each director’s perspective is shared as related to his/her department. The following pages of this proposal contain their ideas and touch on the following considerations for the planning of this new facility: The specific department services provided How nursing care center services coordinate with the services the hospital provides How nursing care center departments interact and coordinate with each other to provide efficient and effective care Potential grants to assist with funding the nursing care center project How departments demonstrate consideration and application of the nursing care center code of ethics Executive Summary Nursing Director Executive Summary Nationwide, nursing staffs is changing in today world include not only long-term to care for their patients’. The population of people receiving treatments in the hospital is becoming highly trained and committed to health care staffs. The goal is to make a difference and to take action to improve the nursing staffs. Highly recommend to improve the nurses to limited...

Words: 3470 - Pages: 14


...that found no dumping of steel tube for the oil and gas industry from South Korea, although preliminary duties were set on imports from countries including Turkey and Vietnam. 2. Philippines sets dumping duty against Turkish flour Source: www.tribune.net.ph Thursday, 24 April 2014 00:00 The Department of Agriculture (DA) has imposed dumping duty on Turkish wheat flour exports to the Philippines. The dumping duty, which will be in addition to the seven percent regular import duty on flour, is as high as 21.79 percent on hard flour for bread, 39.26 percent on biscuit flour and 35.21 percent on soft flour which is used for pastries and cookies.  DA issued the order on April 21. Lauding the DA action, Ric Pinca, executive director of the Philippine Association of Flour Millers (PAFMIL) said, “the decision made by the DA to impose dumping duty on Turkish flour is pro-Filipino, pro-fair trade and pro-Philippine labor which is in danger of losing their livelihood to Turkish laborers producing flour products  dumped in the Philippines.” Pinca said the Philippine wheat flour milling industry has been in the receiving end of unfair trade from Turkey with its cheap subsidized flour being dumped at much lower prices here.  With the government seeing the truth of dumping behind the veneer of very strong Turkish lobby, the Philippine industry can at last breath a little, to say the least. According to PAFMIL, the local flour milling industry still has to......

Words: 2576 - Pages: 11


...U.S.-Israel Science & Technology Foundation Tips on How to Write a Proposal In addition to the title page and budget forms, the USISTF only provides a general outline of the items to include in a proposal. Here are some tips to help you prepare a better proposal. Before you begin preparation of your proposal, carefully read the “Request for Proposals” (RFP) and “Frequently Asked Questions” (FAQs) to clearly understand the issues to be addressed and the information you are required to submit. All proposals must include certain basic information. These basics include: Why are you doing this project? What will you be doing? How will you be doing it? Who will be doing it? Where will it be done? How long will it take? How much will it cost? The following generic proposal template is provided for guidance only. The USISTF does not require a specific format. Follow this format in organizing your thoughts for preparing your proposal. Executive Summary: Some people consider this the most important part of the proposal because it is the reviewer’s first impression. Even though it appears first, write it last because it is a summary of the proposal. The executive summary is a concise description of the project covering objectives, need, methodology, and dissemination plans. It should identify the expected outcomes of the project. An executive summary should be less than 750 words and fit on one page. Need: Well-documented description of the problem to be addressed and why it is......

Words: 744 - Pages: 3

Compare and Contrast Hackers, Crackers & Ceh

...law, certainly crackers are black hats but hackers run the gamut from white to gray to black hat. A newer entry to hacking is the EC-Council Certified Ethical Hacker. The EC-Council began after the September 11, 2001 attacks on the United States of America. This organization created a certification for individuals to work as certified ethical hackers, CEH; meaning these individuals work for companies to provide hacking against their environment, at their request, proactively discovering vulnerabilities or security gaps. The information provided by CEH individuals allows the company to address issues prior to their discovery in the wild. The certified ethical hacker is very different from a cracker as they are contracted to perform the hacking work and will require signed permission slips from their clients. While the hacker and cracker operate in shades of gray and black, a CEH is a white hat hacker believing “To beat a hacker, you need to think like one!” ("Certified Ethical Hacker," n.d., para. 1) From the illegal black hat cracker to the borderline legal actions of hackers and the white hat security assessments of a CEH, the methods used may be similar, but the goals, motivation and results vary wildly. A self-proclaimed hacker, Adrian Lamo, found security vulnerabilities in several systems including MCI WorldCom issues with the core Internet. He disclosed the issues to MCI and with his help they were able to fix the systems. Lamo also hacked into the New York......

Words: 880 - Pages: 4


...MAN3503-Strategic Management IKEA Case Study Sharleen Suwaris-SUSND11 Sharleen Suwaris Executive Summary The following is an analysis of the IKEA case study found in the Strategic Management Text book. This analyses the strategies used by IKEA to gain competitive advantage in markets outside its original area. The report begins by providing a background into IKEA. It studies International Business Level Strategy and the three international corporate level strategies. The case study goes into informing its target market and pricing strategy, which is already discussed. This case study further says how different people in different parts of the world thinks about IKEA, how elegant their designs are and how affordable for them to purchase IKEA products. Some of IKEA’s main markets are in three of the fastest growing markets such as Russia, US and China. IKEA store bring out products such as furniture to small product like a scented candle. IKEA has over 1300 suppliers in about 53 countries. They further have 12 full time in- house designers with 80 free lancers and other production workers to identify the correct raw materials and produce products efficiently and cost effectively. Primarily, IKEA produced standardized products however; this international strategy did not work for one of its vital markets that is, US. Therefore, they had to emphasize on taking corrective actions. The report also analyses the entry methods used by IKEA and its sustainability. IKEA......

Words: 1073 - Pages: 5


...prevent “burnout” within amongst the team. Overworked teams make mistakes and produce low quality. Quality can be very relative and subjective. In order to take out the subjectivity from quality measurement, the team can be asked to work together and come up with tangible metrics to measure the quality of all the technical deliverables that are worked on. This will serve in obtaining an unbiased and tangible view of the progress made on any of the technical deliverables and measure readiness of the solution that is being worked on. In general this same process can be applied to the processes used for setting up the new computers, document servers, shared drives, FTP sites as well as the web-based meeting software environment. Task C Executive Summary Xemba Translations has decided to allow 173 telecommuters. This report gave insight to several risks and suggestions made how to manage them. These risks must be watched closely throughout the project, then controlled once the project is completed. The company needs to carefully watch the employees and client information and makes sure there are proper safety measures in place at all times. The reputation of the company can be seriously compromised if there are not suitable IT security measure in place at all times. The three problems facing the project are over budget, overtime and threat of quality being compromised in order to complete the project. These are being managed by using earned valued and actual cost analysis.......

Words: 4238 - Pages: 17


...suppliers and EPCGlobal to generate advance ship notices for supplier shipments based on RFID reads. January 2006: Supposed deadline for the “next 200 suppliers” to begin sending some tagged product to some DCs, though relatively few do in any meaningful way. March 2006: Wal-Mart says it is working on two “proof of concept” pilots for using sensors along with RFID tags to track produce and environmental temperatures as the products move along the supply chain. April 2006: Wal-Mart says it will phase out the use of Gen 1 tags by in favor of Gen 2 by mid-year, saying it will no longer accept the use of Gen 1 tags on the cases and pallets it receives from its suppliers after June 30. April 2006: Linda Dillman leaves as CIO to take an executive role in Human Resources. Rollin Ford, previously head of supply chain and logistics, becomes CIO. Ford subsequently takes a much lower profile approach to RFID. September, 2006: Wal-Mart announces that by January 31, 2007, another 500 of Wal-Mart's 3,900 stores will have RFID readers installed. If it happened, that would bring the total of RFID-enabled Wal-Mart stores up to 1,000. February 2007: The Wall Street Journal runs an article entitled "Wal-Mart's Radio-Tracked Inventory Hits Static." The article says, "Wal-Mart Stores Inc.'s next leap forward in ultra-efficient distribution is showing signs of fizzling," given a lack of internal progress in rolling out the technology and a lack of value for suppliers. Rollin Ford writes......

Words: 8087 - Pages: 33

Executive Proposal

...To: | The executive management team of Advanced Research (AR), Reston, VA | From: | Samuel Majekodunmi, IT Manager. | Date: | Aug. 30th 2015 | Subject: | The Reasons Advanced Research needs Kali Linux to Enhance and Test Security. | | Purpose | | The purpose of this proposal is the present the executive team of Advance Research (AR) a solution to recent strings of security breaches. The goal of the proposal is to persuade the executive team of Advanced Research to invest personal for the sole purpose of constant testing of network security and vulnerability; therefore ensure AR’s safety of intellectual property. Table of Contents Executive Summary……………………………………………………………………….2 Introduction………………………………………………………………………………..2 Recommendations…………………………………………………………………………3 Budget……………………………………………………………………………………...4 References………………………………………………………………………………….4 Executive Summary Advanced Research (AR) is on its way to becoming a major player in the medical research and development industry. However, suspicion that the corporate network infiltrated from unauthorized sources more than once, indicated the lack of solid security measures. The false allegations of unethical research and development practices are proof of such accesses. Despite the security troubles and false allegations, AR has experienced a 40% increase in business and as result of the increase AR has hires more stuff. The increase traffic is another......

Words: 1213 - Pages: 5

Metasploit Vulnerability Scanner Executive Proposal

...Metasploit Vulnerability Scanner Executive Proposal Paul Dubuque Table of Contents Page 3 Executive Summary Page 5 Background Information Page 6 Recommended Product Page 7 Product Capabilities Page 10 Cost and Training Page 11 References Page 13 Product Reviews Executive Summary To: Advanced Research Corporation Mr. J. Smith, CEO; Ms. S. Long, V.P. Mr. W Donaldson, CCO; Mr. A. Gramer, CCO & Mr. B. Schuler, CFO CC. Ms. K. Young, MR. G. Holdsoth From: P. Dubuque, IT Manager Advance Research Corporation (ARC) has grown rapidly during the last five years and has been very successful in developing new and innovative devices and medicines for the health care industry. ARC has expanded to two locations, New York, NY and Reston, VA which has led to an expanded computer network in support of business communications and research. ARC has been the victim of cyber-attacks on its network and web site, as well as false alegations of unethical practices. ARC’s network is growing, with over two thousand devices currently and reaching from VA to NY. ARC needs to ensure better security of communications, intellectual property (IP) and public image, all of which affect ARC’s reputation with the public and investors. ARC has previously limited information technology (IT) expenditures to desktop computers and network infrastructure hardware such as routers, firewalls and servers. It is imperative that ARC considers information security (IS) and begins to invest in......

Words: 2593 - Pages: 11

Executive Summary Proposal Sample

...Executive Summary “Taste the Fun of Dining” The Meal Deal is a world class catering company that serves both business and private clients in the Philippine market. Established in 2007, the company has operated a catering kitchen and specialized in full-service catering and event planning for upscale events in the country. It is located in the booming, and rapidly expanding Mansions, Makati City. The Meal Deal offers a wide variety and affordable food options for customers without sacrificing the taste, aroma and food presentation of every meal. The menu will be inspired from different region's specialties and appeal to a diverse clientele. It has built up their meals and services beyond each and every customer’s needs. They aim to satisfy not only your immediate requirements but also your subconscious desires to every food. The company’s service is known to be relaxed, very friendly and efficient. Our management team is comprised of individuals whose backgrounds consist of 50 years experience in food, restaurant and hotel, bartending, catering, management, finance, and marketing. The company has years of experience in the catering business and knows what an important client wants and needs. We will have a large specialized menu for customers to select from, and we will offer full catering service providing everything from table settings to the dessert. We anticipate our total sales allocation to be 85% restaurant sales and 15% catering sales.......

Words: 253 - Pages: 2

Advanced Research Executive Proposal

...Advanced research | Tenable Nessus Security Center | Executive Proposal | | James Ellis | 2/21/2015 | [ The following proposal will outline an effective solution for Advanced Research to incorporate in their security audits and assessments. ] | Executive Summary Security testing software is a very important entity for many organizations as it provides security to a company’s network by identifying and testing vulnerabilities before potential hackers can exploit them. Advanced Research has been the victim of cybercriminal efforts to take intellectual assets and sell it to their competitors. It is assumed that our network of corporate documents has been infiltrated by illegal sources more than once. The amount of malware being released to the Internet and infiltrating corporate networks is escalating at an alarming, exponential pace that is doubling every year, (Kaspersky, 2014). Even more disconcerting is that in spite of software vendors efforts to provide patches for vulnerabilities in an expeditious manner as they are discovered, the number of vulnerabilities discovered on existing systems has also increased exponentially, (Kaspersky, 2014). In addition, over 41% of all computers connected to a network were attacked at least once, and this number does not account for the number of attacks to Android mobile devices for which over 98% of all malware is designed to attack, (Kaspersky, 2014). The following is a plan for implementation and purchase of the......

Words: 1577 - Pages: 7

Ceh Course

...EC-Council CEH v7 Course Outline Course Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50 Who Should Attend This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Duration 5 days (9:00 – 5:00) Certification The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification. Page 2 EC-Council Legal Agreement Ethical Hacking and Countermeasures course mission is to......

Words: 458 - Pages: 2

Ceh Test Questions

...about 0xde.0xad.0xbde.0xef which looks like hexadecimal numbers. You immediately enter the following at Windows 2000 command prompt: Ping0xde.0xad.0xbe.0xef You get a response with a valid IP address. What is the obstructed IP address in the e-mail URL? A. B. C. D. Answer: A Explanation: 0x stands for hexadecimal and DE=222, AD=173, BE=190 and EF=239 QUESTION 19: Which of the following tools are used for footprinting?(Choose four. A. Sam Spade B. NSLookup Actualtests.com - The Power of Knowing 312-50 C. Traceroute D. Neotrace E. Cheops Answer: A, B, C, D Explanation: All of the tools listed are used for footprinting except Cheops. QUESTION 20: According to the CEH methodology, what is the next step to be performed after footprinting? A. Enumeration B. Scanning C. System Hacking D. Social Engineering E. Expanding Influence Answer: B Explanation: Once footprinting has been completed, scanning should be attempted next. Scanning should take place on two distinct levels: network and host. QUESTION 21: NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish? nslookup > server > set type =any > ls -d A. Enables DNS spoofing B. Loads bogus entries into the DNS table C. Verifies zone security D. Performs a zone transfer E. Resets the DNS cache Answer: D Explanation: If DNS has not been properly secured, the......

Words: 34575 - Pages: 139

Ceh Practice Exam

...Internet registrys. Which one would you suggest she looks in first? A. LACNIC B. ARIN C. APNIC D. RIPE E. AfriNIC Answer: B Explanation: Regional registries maintain records from the areas from which they govern. ARIN is responsible for domains served within North and South America and therefore, would be a good starting point for a .com domain. Question: 11 Which of the following tools are used for footprinting?(Choose four. A. Sam Spade B. NSLookup Exam Name: Certified Ethical Hacker Exam Type: EC-Council Exam Code: 312-50 Total Questions: 255 Page 4 of 77 C. Traceroute D. Neotrace E. Cheops Answer: A, B, C, D Explanation: All of the tools listed are used for footprinting except Cheops. Question: 12 According to the CEH methodology, what is the next step to be performed after footprinting? A. Enumeration B. Scanning C. System Hacsheets D. Social Engineering E. Expanding Influence Answer: B Explanation: Once footprinting has been completed, scanning should be attempted next. Scanning should take lace on two distinct levels: network and host. Question: 13 NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish? nslookup > server > set type =any > ls -d A. Enables DNS spoofing B. Loads bogus entries into the DNS table C. Verifies zone security D. Performs a zone transfer E. Resets the DNS cache Answer: D Explanation: If DNS has not been properly......

Words: 2821 - Pages: 12