Case Study

You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment. 

1. Pick a site that hosts a social networking functionality other than Facebook. Do not choose Facebook.

2. State the site homepage link, and a short description of the site.

3. Create a clear description of the ideal visitor to this site by considering the details of these demographic elements:

· Age range

· relationship status

· geographical location

· employment status

· type of employment

· income range

· hobbies

· shopping habits

· surfing habits

· Gender

4. Conduct a vulnerability assessment of the site by observation only then answer these questions:

· What are some apparent vulnerabilities?

· What threats are possible on this site?

· What attacks are possible?

· What would be exposed in case there were to be an attack?

5. Write an 8-page paper introducing the site, and your findings from the above exercise, and finalizing by giving a clear recommendation for the organization that owns and/or hosts the site?

Submission Instructions: Be sure your paper ALL of the above requirements, and the following formatting requirements:

· 8 pages (double-spaced), excluding the title page, the abstract page (if included), and the references pages.

· Use at least 3 references outside of your textbook (you may use your textbook too, but are not required to).

· In addition to the required number of pages for the assignment, you must also Include title page, a reference page (bibliography), written in APA style, and a title page.

· Use APA Style formatting in Arial 11 or 12-point font or Times New Roman styles.

· Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations

· Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 15% of the paper, and use quotations sparingly!

This assignment has the embedded TurnItIn feature turned on. When you submit the paper, an originality report will be generated. The report must comply with the acceptable originality criteria displayed in the announcements on Academic Honesty in Week 1 of the course.

Bottom of Form

How to place an order?

Take a few steps to place an order on our site:

  • Fill out the form and state the deadline.
  • Calculate the price of your order and pay for it with your credit card.
  • When the order is placed, we select a suitable writer to complete it based on your requirements.
  • Stay in contact with the writer and discuss vital details of research.
  • Download a preview of the research paper. Satisfied with the outcome? Press “Approve.”

Feel secure when using our service

It's important for every customer to feel safe. Thus, at Your homework help service, we take care of your security.

Financial security You can safely pay for your order using secure payment systems.
Personal security Any personal information about our customers is private. No other person can get access to it.
Academic security To deliver no-plagiarism samples, we use a specially-designed software to check every finished paper.
Web security This website is protected from illegal breaks. We constantly update our privacy management.

Get assistance with placing your order. Clarify any questions about our services. Contact our support team. They are available 24\7.

Still thinking about where to hire experienced authors and how to boost your grades? Place your order on our website and get help with any paper you need. We’ll meet your expectations.

Order now Get a quote