Web Application Attack scenario

Assignment: Case Study Research the web and find an appropriate incident related to either a successful or failed penetration testing effort, or a successful or unsuccessful hacking attempt against an organization, business or government facility. Lay out the details of the case, and provide your analysis of what was done and why, and speculate on what should have been done, or could have been done differently. As part of your analysis, you can speculate on what you might have done to change the outcome of your particular case. Draw specific lessons from the case and possible recommendations for future situations. Write a paper with no less than five pages in which you: Research the web and identify a case study with an appropriate situation related to penetration testing or hacking for or against a business, organization, or government facility. Lay out the case details, and provide your analysis of what was done and why, the results of the effort, the specific threats and vulnerabilities, and what mitigation was attempted or should have been attempted. You may speculate on what actions you might have taken in a similar situation as part of your analysis. Draw specific lessons and recommendations from your analysis of the case as part of the conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft. Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Notes: This paper will be check for plagiarism and ensure to write an upper level research paper. Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric. I expect an upper level research paper that demonstrates mastery of several skills to include developing argument in proper English and good developed paragraphs, solid use of research to support ideas, a well focused and argued paper, leading to a very well-crafted, detailed and in depth conclusion. Click here to view the grading rubric for this case study. Points: 140 Assignment: Case Study Criteria Unacceptable Below 60 % F Meets Minimum Expectations 60-69 % D Fair 70-79 % C Proficient 80-89 % B Exemplary 90-100 % A 1. Research the web and identify a case study with an appropriate situation related to penetration testing or hacking for or against a business, organization, or government facility. Lay out the case details, and provide your analysis of what was done and why, the results of the effort, the specific threats and vulnerabilities, and what mitigation was attempted or should have been attempted. Weight: 40% Did not submit or incompletely analyzed a case study related to penetration testing or hacking against a business, organization, or government facility. Insufficiently provided a summary of the case, or lacked sufficient details to provide a sound analysis, or did not provide sufficient detail on threats, vulnerabilities or mitigation. Insufficiently analyzed a case study related to penetration testing or hacking against a business, organization, or government facility. Provided only cursory or superficial details of the case, failed to sufficiently develop one’s analysis, or had missing detail on threats, vulnerabilities or mitigation. Sufficiently covered the bare essentials of a case, and minimum analysis of a case study related to penetration testing or hacking against a business, organization, or government facility. Provided a basic summary of the case, but lacked some key details or failed to sufficiently develop all arguments to provide a sound analysis, or had missing detail on threats, vulnerabilities or mitigation. Satisfactorily analyzed a case study related to penetration testing or hacking against a business, organization, or government facility. Provided a good summary of the case, developed key arguments, had sufficient details to provide a sound analysis, and had good detail on threats, vulnerabilities or mitigation. Thoroughly analyzed a case study related to penetration testing or hacking against a business, organization, or government facility. Had a detailed case summary, fully develop all arguments, and provide details as needed to develop the discussion on threats, vulnerabilities, and mitigation. 2. Draw specific lessons and recommendations as part of the conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft. Weight: 40% Did not submit lessons and takeaway in the conclusion, or have concluding paragraph, or a paragraph or less of closing statement that only partially touches upon what was presented in the body. Does not have an introduction, or just a partial introduction. Had insufficient or partial lessons and takeaway in the conclusion, or weak concluding paragraph, or a paragraph or less of closing statement that touches upon what was presented in the body, or provides only a summary of key points. Does not have a complete or just a partial introduction. Has some or adequate lessons and takeaway in the conclusion, or weak concluding paragraph, or a paragraph or less of closing statement that touches upon what was presented in the body, or provides only a summary of key points. Does not have a complete introduction, or is missing a key element of an introduction. Covers most of the key lessons and takeaway in the conclusion, or recommendations, but may fall short on some detail. Has a good to excellent introduction but may be missing an element. Thoroughly develops a multi-paragraph conclusion of key lessons and recommendations with sufficient depth and detail to lead to a strong concluding paragraph. Fully introduces the paper setting both the tone and scope of what the paper accomplished. 3. Five (5) references Weight: 10% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 4. Clarity, writing mechanics, and formatting requirements. Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present
_assignment_wk_9.docx

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Web Application Attack scenario
Just from $13/Page
Order Essay

Assignment: Case Study
Research the web and find an appropriate incident related to either a successful or failed
penetration testing effort, or a successful or unsuccessful hacking attempt against an
organization, business or government facility. Lay out the details of the case, and provide your
analysis of what was done and why, and speculate on what should have been done, or could have
been done differently. As part of your analysis, you can speculate on what you might have done
to change the outcome of your particular case. Draw specific lessons from the case and possible
recommendations for future situations.
1.
2.
3.
4.
5.
•
•
Write a paper with no less than five pages in which you:
Research the web and identify a case study with an appropriate situation related to penetration
testing or hacking for or against a business, organization, or government facility.
Lay out the case details, and provide your analysis of what was done and why, the results of the
effort, the specific threats and vulnerabilities, and what mitigation was attempted or should have
been attempted.
You may speculate on what actions you might have taken in a similar situation as part of your
analysis.
Draw specific lessons and recommendations from your analysis of the case as part of the
conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to
reflect what the paper accomplished once you finish your first draft.
Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, your name, the professor’s name, the
course title, and the date. The cover page and the reference page are not included in the required
assignment page length.
Notes: This paper will be check for plagiarism and ensure to write an upper level research paper.
Grading for this assignment will be based on answer quality, logic/organization of the paper, and
language and writing skills, using the following rubric.
I expect an upper level research paper that demonstrates mastery of several skills to include
developing argument in proper English and good developed paragraphs, solid use of research to
support ideas, a well focused and argued paper, leading to a very well-crafted, detailed and in
depth conclusion.
Click here to view the grading rubric for this case study.
Points: 140
Criteria
1. Research the web
and identify a case
study with an
appropriate situation
related to penetration
testing or hacking for
or against a business,
organization, or
government facility.
Lay out the case
details, and provide
your analysis of what
was done and why,
the results of the
effort, the specific
threats and
vulnerabilities, and
what mitigation was
attempted or should
have been attempted.
Weight: 40%
2. Draw specific
lessons and
recommendations as
part of the conclusion,
and have a strong
concluding
paragraph. Be sure
to revise your
introduction to reflect
what the paper
accomplished once
you finish your first
draft.
Weight: 40%
3. Five (5) references
Weight: 10%
Assignment: Case Study
Unacceptable
Below 60 % F
Did not submit or
incompletely analyzed
a case study related to
penetration testing or
hacking against a
business, organization,
or government facility.
Insufficiently provided a
summary of the case,
or lacked sufficient
details to provide a
sound analysis, or did
not provide sufficient
detail on threats,
vulnerabilities or
mitigation.
Did not submit lessons
and takeaway in the
conclusion, or have
concluding paragraph,
or a paragraph or less
of closing statement
that only partially
touches upon what was
presented in the body.
Does not have an
introduction, or just a
partial introduction.
Meets Minimum
Expectations
60-69 % D
Fair
70-79 % C
Proficient
80-89 % B
Exemplary
90-100 % A
Sufficiently covered the
bare essentials of a
case, and minimum
analysis of a case
study related to
penetration testing or
hacking against a
business, organization,
or government facility.
Satisfactorily analyzed
a case study related to
penetration testing or
hacking against a
business, organization,
or government facility.
Thoroughly analyzed a
case study related to
penetration testing or
hacking against a
business, organization,
or government facility.
Provided a good
summary of the case,
developed key
Provided a basic
arguments, had
summary of the case,
sufficient details to
but lacked some key
provide a sound
details or failed to
analysis, and had good
sufficiently develop all detail on threats,
arguments to provide a vulnerabilities or
sound analysis, or had mitigation.
missing detail on
threats, vulnerabilities
or mitigation.
Had a detailed case
summary, fully develop
all arguments, and
provide details as
needed to develop the
discussion on threats,
vulnerabilities, and
mitigation.
Had insufficient or
partial lessons and
takeaway in the
conclusion, or weak
concluding paragraph,
or a paragraph or less
of closing statement
that touches upon what
was presented in the
body, or provides only
a summary of key
points.
Has some or adequate
lessons and takeaway
in the conclusion, or
weak concluding
paragraph, or a
paragraph or less of
closing statement that
touches upon what was
presented in the body,
or provides only a
summary of key
points.
Covers most of the key
lessons and takeaway
in the conclusion, or
recommendations, but
may fall short on some
detail.
Does not have a
complete or just a
partial introduction.
Does not have a
complete introduction,
or is missing a key
element of an
introduction.
Insufficiently analyzed
a case study related to
penetration testing or
hacking against a
business, organization,
or government facility.
Provided only cursory
or superficial details of
the case, failed to
sufficiently develop
one’s analysis, or had
missing detail on
threats, vulnerabilities
or mitigation.
No references provided Does not meet the
required number of
references; all
references poor quality
choices.
Does not meet the
required number of
references; some
references poor quality
choices.
Thoroughly develops a
multi-paragraph
conclusion of key
lessons and
recommendations with
sufficient depth and
detail to lead to a
Has a good to excellent strong concluding
introduction but may be paragraph.
missing an element.
Fully introduces the
paper setting both the
tone and scope of what
the paper
accomplished.
Meets number of
required references; all
references high quality
choices.
Exceeds number of
required references; all
references high quality
choices.
4. Clarity, writing
mechanics, and
formatting
requirements.
Weight: 10%
More than 8 errors
present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

Purchase answer to see full
attachment

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency

Order your essay today and save 15% with the discount code ESSAYHELP