Description
Your assignment in a couple days is to create either an infographic or an online video. Which did you, or will you, select? What tool did you, or will you, use to create your infographic or video? Why did you select this tool?
You need a reference for every opinion you state
Must be APA
Original work only
200 - 300 words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
I was having a hard time with this subject, and this was a great help.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the in ...
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the information security industry, and will be the
culmination of your work in IT 320. This is your opportunity to bring all that you have learned together to analyze a network, evaluate vulnerabilities and risks,
and recommend mitigation strategies.
A vulnerability report typically includes the following:
A security assessment of a computer network
Identification of vulnerabilities, supported with evidence
An interpretive analysis of risks, including benchmarking or ranking risk using levels or similar metrics
Recommended mitigation steps or solutions
Vulnerability reports are written for a diverse audience within an organization. Therefore, they include an executive summary for managers and decision-makers
as well as technical data for analysis by other IT professionals. Organizations may require vulnerability reports to meet compliance requirements or may have
internal policies that call for a vulnerability assessment and completion of a report on a fixed schedule.
Vulnerability reports are often researched and produced by information security experts from outside the organization. As you will see in the assignment prompt
below, you will play the role of an information security consultant as you complete this final project.
Your work on this project is supported by two milestones, in Modules Three and Five, that are designed to support you as you go through the final project lab
and gather the information you need to create your vulnerability report draft. These milestones are important practice opportunities from which you will gain
critical feedback that will inform your final draft of this project that you will submit in Module Seven.
Your practice work and your instructor feedback will be especially important as you craft your executive summary for this project. This executive summary
section is not contained within the milestone activities. It would not make sense to create that final summary piece until you have completed your drafts,
received your instructor feedback, and are ready to finalize your final project draft in Module Seven.
In this assignment, you will demonstrate your mastery of the following course outcomes:
IT-320-01: Assess in-house, distributed, or cloud-based networks for their current security posture
IT-320-02: Recommend mitigation strategies for hardening network operating systems, applications, and network devices based on National Institute of
Standards and Technology (NIST) standards
IT-320-03: Implement network hardening solutions for addressing vulnerable network security postures
2
IT-320-04: Interpret data from networking and system logs for building security assurance
Prompt
ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes.
Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was
unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should
be allowed from outside of the network.
Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Provide background information and the high-level findings of your report to establish a detailed context based on your
assessment of the network, the evidence you collected (your Milestone One work), and the mitigation strategy, recommendations, and solutions
(your Milestone Two work) you addressed.
a) What is the purpose of the vulnerability report? How should it be used and interpreted by the enterprise? [IT-320-02]
b) What was your methodology for identifying security vulnerabilities? This is where you should briefly describe the tools and techniques
that you used to find the vulnerabilities. [IT-320-01]
c) Overall, what was your determination about the enterprise’s current security posture. [IT-320-01]
II. Network Assessment – Gathering Evidence of the Vulnerabilities:
In this part of your project, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate
scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please
see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that
environment. Be sure your responses and supporting evidence address the following questions:
a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with
evidence. [IT-320-01]
b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or
unused? Support your response with evidence. [IT-320-01]
c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence. [IT-320-01]:
i. What kinds of antivirus software, malware protection, or other security software is in place?
ii. What are the risks associated with the gaps in malicious software prevention?
iii. What are the risks associated with leaving the malicious software prevention strategies as they are now?
d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with
evidence from your Wireshark and NetworkMiner tools. [IT-320-01]
3
III. Vulnerability Assessment – Interpreting Evidence of Vulnerabilities:
In this part of your project, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security
vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the
output from these tools. Be sure your responses and supporting evidence address the following questions:
a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain
what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? [IT-320-04]
c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose.
For example, what did you find when you used the OpenVAS tool? [IT-320-04]
d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
IV. Network Security Posture Recommendations:
In this area, you will identify what aspects of the network should be examined to address the network security posture. Use your knowledge from
research, readings, and activities in the course to help you. For Parts e and f, it may be helpful to organize your information in a table format for
organizational purposes. A sample is provided for you in the Supporting Information section.
a) Identify key aspects of the network that should be examined to address the network security posture ensuring the following key criteria have
been included: [IT-320-03]
i. At least one issue associated with the firewall
ii. At last one issue associated with one or more client machines
iii. At least one issue associated with one or more server machines
iv. At least one issue associated with a Windows host
b) Indicate the impact of the vulnerability. [IT-320-03]
c) Indicate the likelihood of the vulnerability. [IT-320-03]
d) What mitigation strategies do you recommend be implemented for addressing all of the issues uncovered in your network assessment
above? Support your response with evidence from your lab work and coursework. [IT-320-02]
e) Prioritize the recommended strategies for the company. Use the matrix in the Supporting Information section to assess the priority. [IT-
320-02]
f) Explain the rationale of the prioritization you have chosen for each solution. [IT-320-02]
V. Implementation Solutions:
In this area, you will add a brief written summary following your charts that demonstrates you actually implemented the solutions you
recommended in your lab environment. Your written responses should include evidence in the form of a screenshot or screen capture that
demonstrates you have executed your proposed recommendations.
a) Execute your proposed strategy specific to at least one of the issues you have uncovered with firewalls and support your response with
evidence. [IT-320-03]
b) Harden the server(s) using at least one method and support your response with evidence. [IT-320-03]
Review the testing assignment scenario and use all of the testing techniques, computer science homework help
3 sections that need to be done as separate reports but build on the one before.TESTING
ASSIGNMENT SCENARIO:
...
Review the testing assignment scenario and use all of the testing techniques, computer science homework help
3 sections that need to be done as separate reports but build on the one before.TESTING
ASSIGNMENT SCENARIO:
You
and your testing team have been tasked with testing a new benefits application
that is being developed. Your company uses a flexible benefits plan, allowing
company employees to customer their heal benefit plan based on personal
preferences. The benefits application is expected to go live in 3 months.
Your
company’s Human Resources department uses a cafeteria-style approach to provide
employees with health care benefits. Each September, employees review their
current benefits, modify their elections and then sign election forms. Any
changes must be entered and tracked in the benefits application. For medical
insurance, an employee enrolls with a preferred provider organization (PPO) or
health maintenance organization (HMO). The company currently pays the monthly
medical premiums for its employees. However, if an employee enrolls in a dental
plan or vision plan, the employee pays a modest monthly premium for the
optional plan. An employee may carry medical, dental, and/or vision coverage
for one or more of his or her family members. In order to carry insurance on a
family member, the employee must carry the same coverage. For example, to carry
dental insurance on a spouse, the employee must also carry dental insurance on
him or herself.
The
benefits application must track employee information like employee ID,
department ID, name, address information and office extension number. It must
also track information about each insurance company to include the company
number and company name. Dependent information and their relationship to the
insured employee must also be tracked. An employee must be able to request an
enrollment form, and Human Resources must be able to update the effective date
of the health benefits on the form. In addition, the application must track the
health care benefits rates for PPO and HMO, plus dental and vision rates.
Benefits rates differ by employee only, employee + spouse, employee + spouse +
one child, and employee + family.
Testing Assignment Description:
Review the testing assignment
scenario.
Using all of the testing
techniques, methods, processes and tools learned throughout the semester,
complete a comprehensive plan for testing which incorporates all of the
following elements:
User stories/requirements for
testing
Static and dynamic testing
techniques
Test conditions, test cases
and potential test scripts
Test design to include white
box and black box techniques
Exploratory testing plans
Functional test plan or full
test plan
Test effort estimates.
Testing team roles and
resources
Plan for incident management
and reporting
Key metrics that you plan to
measure and report on
Risk analysis
Generate a written report that
includes these components or compile a PowerPoint presentation. This
should be a professional and comprehensive report or presentation that you
would turn into your employer.
Be sure to explain throughout
the paper/presentation why you chose certain techniques or approaches over
others. Also explain any assumptions you made as you performed the
assignment.
Milestones and Deadlines:
To
ensure adequate and timely effort for your course capstone testing project three preliminary milestones will be required before you turn
in the completed comprehensive plan for testing. Requirements for these
milestones are described below.
Milestone #1
Begin
creating your written report or PowerPoint presentation you need to have the following elements included:
User stories/requirements for
testing
Static and dynamic testing
techniques
Submit
as a Word document via the assignment tool.
Milestone #2
Continue
developing your written report of PowerPoint presentation you need to have the following elements added:
Test conditions, test cases and
potential test scripts
Test design to include white
box and black box techniques
Exploratory testing plans
Functional test plan or full
test plan
Submit
as a Word document via the assignment tool.
Milestone #3:
Continue
developing your written report or PowerPoint presentation you need to have the following elements added:
Test effort estimates
Testing team roles and
resources
Plan for incident management
and reporting
Key metrics you plan to measure
and report on
Risk analysis
Submit
the final, comprehensive version of your written report or PowerPoint
presentation.
16 pages
Forensic Report 1
On September 12, 2017, the James Randel the president of PAGS contacted our company Root Forensics LLC to assist in handli ...
Forensic Report 1
On September 12, 2017, the James Randel the president of PAGS contacted our company Root Forensics LLC to assist in handling a sensitive matter which ...
2 pages
Status Report
This week I expected to sensitize various stakeholders in the company on the importance Through the sensitization campaign ...
Status Report
This week I expected to sensitize various stakeholders in the company on the importance Through the sensitization campaigns, I targeted at creating ...
CSC 400 Wilmington University Chapter 2 Analyzing the Business CaseNote to Students Paper
Chapter 2: Analyzing the Business CaseNote to Students:After you complete the Practice Tasks, click hereto view the sample ...
CSC 400 Wilmington University Chapter 2 Analyzing the Business CaseNote to Students Paper
Chapter 2: Analyzing the Business CaseNote to Students:After you complete the Practice Tasks, click hereto view the sample answers and check your work. Your answers might vary from these examples and still be correct. The intent is to give you a sample to guide you and serve as a reference. When you complete the Practice Tasks and review the sample answers,please return to this page and complete the Challenge Tasks.BackgroundAs an IT intern at Game Technology, you often assist analysts with feasibility studies. The work can include intense fact-finding and tight deadlines. You decide to add a new section to your journal to describe the four different types of feasibility. In your journal, you want to include a definition of each feasibility type, and a sample statement that would indicate a lackof feasibility. For example:The hardware has limited capacity for future needs.Our users will resist the new system because it is the third change in 18 months.The project will take too long to pay for itself.Development cannot begin until next year, which is too late.You also want to learn more about project constraints. You know that constraints can be grouped into various categories: present vs. future, internal vs. external, and mandatory vs. desirable. You plan to use a grid chart like the one in Figure 2-15on page 60to show the constraints. Practice TasksTask 1.Define each feasibility type and include an example that showsa lack of feasibilityFor this task, you created three sample constraints, as follows:The new IRS tax rates must go into effect as soon as possible.From now on, we should try to hire technicians with A+ certifications.Starting next year, government regulations will require a detailed security analysis.Now create a grid chart that shows the three sample constraints. You should use Figure 2-15 on page 60as a model.Challenge TasksAfter you complete the Practice Tasks, you learn about new developments at Game Technology. This morning you received a message from Felesia Stukes, the IT director. She is sending you a list of planning statements and she wants you to decide which type offeasibility applies. She also wants you to prepare a diagram that will show a list of constraints. Task 1.Reply to Felesia and indicate the type of feasibility for each of the following statements.Based on the future cost of support and maintenance, TCO will be very high.Critical Thinking Challenge: Tasks Page
Uses of Information Technology
How could a business use information technology to increase switching costs and lock in its customers and suppliers? How c ...
Uses of Information Technology
How could a business use information technology to increase switching costs and lock in its customers and suppliers? How could a business integrate flexible and rigid solutions? Use business examples to support your answer.
Similar Content
UOC Computer Investigations and Forensics Performance Analysis Lab
Lab Assessment #6 – Lab Report File You must complete the assignment in a Word document and then upload it to the ass...
Assignment 3: Evaluating Access Control Methods
Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chi...
Using your Week 1 IP as a starting point, extend the design to accommodate degree, assignment help
Using your Week 1 IP as a starting point, extend the design to accommodate degree programs. The new design should incorpor...
Computer memory hacking, assignment help
Write a two to three (2-3) page paper in which you:Describe what hacking of memory or hacking of RAM means. Examine t...
New England College Chapter 5 Cyber Security and Medical Technology Paper
The Research Report, select one of the following research areas:. The final submission should include DETAILS of each of f...
CS 240 JUC Application of Graph Theory in Computer Science Research
JUBAIL UNIVERSITY COLLEGE
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
SEMESTER 432
GROUP ASSIGNMENT
Course Code
CS240
...
Open The Project
...
Critical Analysis.edited
Critical Thinking, Morals, Ethics and Law in Modes of Ethics Critical Thinking, Morals, Ethics and Law in Modes of Ethic...
Android Activities
Include a button in “DisplayMessageActivity” to go to the new activity called Display in the new activity called “Di...
Related Tags
Book Guides
Twilight
by Stephenie Meyer
Cat on a Hot Tin Roof
by Tennessee Williams
The Russian Hoax
by Gregg Jarrett
Broke Millennial: Stop Scraping by and Get Your Financial Life Together
by Erin Lowry
As I Lay Dying
by William Faulkner
The Metamorphosis
by Franz Kafka
Epic of Gilgamesh
by Unknown
Normal People
by Sally Rooney
Dracula
by Bram Stoker
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the in ...
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the information security industry, and will be the
culmination of your work in IT 320. This is your opportunity to bring all that you have learned together to analyze a network, evaluate vulnerabilities and risks,
and recommend mitigation strategies.
A vulnerability report typically includes the following:
A security assessment of a computer network
Identification of vulnerabilities, supported with evidence
An interpretive analysis of risks, including benchmarking or ranking risk using levels or similar metrics
Recommended mitigation steps or solutions
Vulnerability reports are written for a diverse audience within an organization. Therefore, they include an executive summary for managers and decision-makers
as well as technical data for analysis by other IT professionals. Organizations may require vulnerability reports to meet compliance requirements or may have
internal policies that call for a vulnerability assessment and completion of a report on a fixed schedule.
Vulnerability reports are often researched and produced by information security experts from outside the organization. As you will see in the assignment prompt
below, you will play the role of an information security consultant as you complete this final project.
Your work on this project is supported by two milestones, in Modules Three and Five, that are designed to support you as you go through the final project lab
and gather the information you need to create your vulnerability report draft. These milestones are important practice opportunities from which you will gain
critical feedback that will inform your final draft of this project that you will submit in Module Seven.
Your practice work and your instructor feedback will be especially important as you craft your executive summary for this project. This executive summary
section is not contained within the milestone activities. It would not make sense to create that final summary piece until you have completed your drafts,
received your instructor feedback, and are ready to finalize your final project draft in Module Seven.
In this assignment, you will demonstrate your mastery of the following course outcomes:
IT-320-01: Assess in-house, distributed, or cloud-based networks for their current security posture
IT-320-02: Recommend mitigation strategies for hardening network operating systems, applications, and network devices based on National Institute of
Standards and Technology (NIST) standards
IT-320-03: Implement network hardening solutions for addressing vulnerable network security postures
2
IT-320-04: Interpret data from networking and system logs for building security assurance
Prompt
ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes.
Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was
unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should
be allowed from outside of the network.
Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Provide background information and the high-level findings of your report to establish a detailed context based on your
assessment of the network, the evidence you collected (your Milestone One work), and the mitigation strategy, recommendations, and solutions
(your Milestone Two work) you addressed.
a) What is the purpose of the vulnerability report? How should it be used and interpreted by the enterprise? [IT-320-02]
b) What was your methodology for identifying security vulnerabilities? This is where you should briefly describe the tools and techniques
that you used to find the vulnerabilities. [IT-320-01]
c) Overall, what was your determination about the enterprise’s current security posture. [IT-320-01]
II. Network Assessment – Gathering Evidence of the Vulnerabilities:
In this part of your project, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate
scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please
see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that
environment. Be sure your responses and supporting evidence address the following questions:
a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with
evidence. [IT-320-01]
b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or
unused? Support your response with evidence. [IT-320-01]
c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence. [IT-320-01]:
i. What kinds of antivirus software, malware protection, or other security software is in place?
ii. What are the risks associated with the gaps in malicious software prevention?
iii. What are the risks associated with leaving the malicious software prevention strategies as they are now?
d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with
evidence from your Wireshark and NetworkMiner tools. [IT-320-01]
3
III. Vulnerability Assessment – Interpreting Evidence of Vulnerabilities:
In this part of your project, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security
vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the
output from these tools. Be sure your responses and supporting evidence address the following questions:
a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain
what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? [IT-320-04]
c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose.
For example, what did you find when you used the OpenVAS tool? [IT-320-04]
d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
IV. Network Security Posture Recommendations:
In this area, you will identify what aspects of the network should be examined to address the network security posture. Use your knowledge from
research, readings, and activities in the course to help you. For Parts e and f, it may be helpful to organize your information in a table format for
organizational purposes. A sample is provided for you in the Supporting Information section.
a) Identify key aspects of the network that should be examined to address the network security posture ensuring the following key criteria have
been included: [IT-320-03]
i. At least one issue associated with the firewall
ii. At last one issue associated with one or more client machines
iii. At least one issue associated with one or more server machines
iv. At least one issue associated with a Windows host
b) Indicate the impact of the vulnerability. [IT-320-03]
c) Indicate the likelihood of the vulnerability. [IT-320-03]
d) What mitigation strategies do you recommend be implemented for addressing all of the issues uncovered in your network assessment
above? Support your response with evidence from your lab work and coursework. [IT-320-02]
e) Prioritize the recommended strategies for the company. Use the matrix in the Supporting Information section to assess the priority. [IT-
320-02]
f) Explain the rationale of the prioritization you have chosen for each solution. [IT-320-02]
V. Implementation Solutions:
In this area, you will add a brief written summary following your charts that demonstrates you actually implemented the solutions you
recommended in your lab environment. Your written responses should include evidence in the form of a screenshot or screen capture that
demonstrates you have executed your proposed recommendations.
a) Execute your proposed strategy specific to at least one of the issues you have uncovered with firewalls and support your response with
evidence. [IT-320-03]
b) Harden the server(s) using at least one method and support your response with evidence. [IT-320-03]
Review the testing assignment scenario and use all of the testing techniques, computer science homework help
3 sections that need to be done as separate reports but build on the one before.TESTING
ASSIGNMENT SCENARIO:
...
Review the testing assignment scenario and use all of the testing techniques, computer science homework help
3 sections that need to be done as separate reports but build on the one before.TESTING
ASSIGNMENT SCENARIO:
You
and your testing team have been tasked with testing a new benefits application
that is being developed. Your company uses a flexible benefits plan, allowing
company employees to customer their heal benefit plan based on personal
preferences. The benefits application is expected to go live in 3 months.
Your
company’s Human Resources department uses a cafeteria-style approach to provide
employees with health care benefits. Each September, employees review their
current benefits, modify their elections and then sign election forms. Any
changes must be entered and tracked in the benefits application. For medical
insurance, an employee enrolls with a preferred provider organization (PPO) or
health maintenance organization (HMO). The company currently pays the monthly
medical premiums for its employees. However, if an employee enrolls in a dental
plan or vision plan, the employee pays a modest monthly premium for the
optional plan. An employee may carry medical, dental, and/or vision coverage
for one or more of his or her family members. In order to carry insurance on a
family member, the employee must carry the same coverage. For example, to carry
dental insurance on a spouse, the employee must also carry dental insurance on
him or herself.
The
benefits application must track employee information like employee ID,
department ID, name, address information and office extension number. It must
also track information about each insurance company to include the company
number and company name. Dependent information and their relationship to the
insured employee must also be tracked. An employee must be able to request an
enrollment form, and Human Resources must be able to update the effective date
of the health benefits on the form. In addition, the application must track the
health care benefits rates for PPO and HMO, plus dental and vision rates.
Benefits rates differ by employee only, employee + spouse, employee + spouse +
one child, and employee + family.
Testing Assignment Description:
Review the testing assignment
scenario.
Using all of the testing
techniques, methods, processes and tools learned throughout the semester,
complete a comprehensive plan for testing which incorporates all of the
following elements:
User stories/requirements for
testing
Static and dynamic testing
techniques
Test conditions, test cases
and potential test scripts
Test design to include white
box and black box techniques
Exploratory testing plans
Functional test plan or full
test plan
Test effort estimates.
Testing team roles and
resources
Plan for incident management
and reporting
Key metrics that you plan to
measure and report on
Risk analysis
Generate a written report that
includes these components or compile a PowerPoint presentation. This
should be a professional and comprehensive report or presentation that you
would turn into your employer.
Be sure to explain throughout
the paper/presentation why you chose certain techniques or approaches over
others. Also explain any assumptions you made as you performed the
assignment.
Milestones and Deadlines:
To
ensure adequate and timely effort for your course capstone testing project three preliminary milestones will be required before you turn
in the completed comprehensive plan for testing. Requirements for these
milestones are described below.
Milestone #1
Begin
creating your written report or PowerPoint presentation you need to have the following elements included:
User stories/requirements for
testing
Static and dynamic testing
techniques
Submit
as a Word document via the assignment tool.
Milestone #2
Continue
developing your written report of PowerPoint presentation you need to have the following elements added:
Test conditions, test cases and
potential test scripts
Test design to include white
box and black box techniques
Exploratory testing plans
Functional test plan or full
test plan
Submit
as a Word document via the assignment tool.
Milestone #3:
Continue
developing your written report or PowerPoint presentation you need to have the following elements added:
Test effort estimates
Testing team roles and
resources
Plan for incident management
and reporting
Key metrics you plan to measure
and report on
Risk analysis
Submit
the final, comprehensive version of your written report or PowerPoint
presentation.
16 pages
Forensic Report 1
On September 12, 2017, the James Randel the president of PAGS contacted our company Root Forensics LLC to assist in handli ...
Forensic Report 1
On September 12, 2017, the James Randel the president of PAGS contacted our company Root Forensics LLC to assist in handling a sensitive matter which ...
2 pages
Status Report
This week I expected to sensitize various stakeholders in the company on the importance Through the sensitization campaign ...
Status Report
This week I expected to sensitize various stakeholders in the company on the importance Through the sensitization campaigns, I targeted at creating ...
CSC 400 Wilmington University Chapter 2 Analyzing the Business CaseNote to Students Paper
Chapter 2: Analyzing the Business CaseNote to Students:After you complete the Practice Tasks, click hereto view the sample ...
CSC 400 Wilmington University Chapter 2 Analyzing the Business CaseNote to Students Paper
Chapter 2: Analyzing the Business CaseNote to Students:After you complete the Practice Tasks, click hereto view the sample answers and check your work. Your answers might vary from these examples and still be correct. The intent is to give you a sample to guide you and serve as a reference. When you complete the Practice Tasks and review the sample answers,please return to this page and complete the Challenge Tasks.BackgroundAs an IT intern at Game Technology, you often assist analysts with feasibility studies. The work can include intense fact-finding and tight deadlines. You decide to add a new section to your journal to describe the four different types of feasibility. In your journal, you want to include a definition of each feasibility type, and a sample statement that would indicate a lackof feasibility. For example:The hardware has limited capacity for future needs.Our users will resist the new system because it is the third change in 18 months.The project will take too long to pay for itself.Development cannot begin until next year, which is too late.You also want to learn more about project constraints. You know that constraints can be grouped into various categories: present vs. future, internal vs. external, and mandatory vs. desirable. You plan to use a grid chart like the one in Figure 2-15on page 60to show the constraints. Practice TasksTask 1.Define each feasibility type and include an example that showsa lack of feasibilityFor this task, you created three sample constraints, as follows:The new IRS tax rates must go into effect as soon as possible.From now on, we should try to hire technicians with A+ certifications.Starting next year, government regulations will require a detailed security analysis.Now create a grid chart that shows the three sample constraints. You should use Figure 2-15 on page 60as a model.Challenge TasksAfter you complete the Practice Tasks, you learn about new developments at Game Technology. This morning you received a message from Felesia Stukes, the IT director. She is sending you a list of planning statements and she wants you to decide which type offeasibility applies. She also wants you to prepare a diagram that will show a list of constraints. Task 1.Reply to Felesia and indicate the type of feasibility for each of the following statements.Based on the future cost of support and maintenance, TCO will be very high.Critical Thinking Challenge: Tasks Page
Uses of Information Technology
How could a business use information technology to increase switching costs and lock in its customers and suppliers? How c ...
Uses of Information Technology
How could a business use information technology to increase switching costs and lock in its customers and suppliers? How could a business integrate flexible and rigid solutions? Use business examples to support your answer.
Earn money selling
your Study Documents