Preview

Penetration Plan

Powerful Essays
Open Document
Open Document
2140 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Penetration Plan
Running Head: E-commerce Sales

Unit 1
E-commerce Sales
Penetration Test Plan

Tom Moccia
IT542 Dr. Matthew North
Kaplan University
March 19, 2013

Table of Contents Scope 3 Goals and Objectives 4 Tasks 4 Reporting 7 Schedule 9 Unanswered Questions 10 Authorization Letter 11 References 13

Scope

This Vulnerability and Penetration Test Plan is designed specifically for E-commerce Sales and is designed to determine what steps need to be taken to secure and protect the network against malicious attacks. This Vulnerability and Penetration Test will cover numerous aspects of the E-commerce Sales information technology infrastructure including the production e-commerce web application server and the Cisco network. The e-commerce web application server will act as the external point of entry into the WAN and LAN where the following occurs:

• Ubuntu Linux 10.04 LTS Server (TargetUbuntu01) • Apache Web Server running the e-commerce web application server • Credit card processing

The E-commerce Sales network covers five sites, Norfolk, Tampa, Indianapolis, Seattle, and West Covina which all connect with the corporate headquarters. This test will be an intrusive test, but will not compromise any data that falls outside of the authorization letter without additional written permission from E-commerce Sales. No customer payment information will be compromised and if vulnerabilities are found that would endanger customer financial information the client will be notified immediately. All testing will take place outside of normal business hours, which is documented in the schedule and milestone breakdown section of this plan.

Goals and Objectives

The ultimate goal of the Vulnerability and Penetration test will be to determine what risks are present in the E-commerce network. As



References: Bacudio, A., Yuan, X., Chu, B., & Jones, M. (2011). An overview of penetration testing. International Journal of Network Security & Its Applications, 3(6), 19. Retrieved from http://airccse.org/journal/nsa/1111nsa02.pdf Dobison, M. (2011, September 9). http://www.fireworkswebsites.com.au/images/example-penetration-security-testing.pdf. Retrieved from http://www.fireworkswebsites.com.au/images/example-penetration-security-testing.pdf Federal Office of Information Security. (n.d.). Study: A penetration testing model. Retrieved from http://www.slideshare.net/kushwahaa/a-penetration-testing-model Infond Securite Informatique. (2010, May 20). tutorial footprinting - passive information gathering before a pentest. Retrieved from http://www.infond.fr/2010/05/toturial-footprinting.html Northcutt, S., Shenk, J., Shackleford, D., Rosenberg, T., Siles, R., & Mancini, S. (2006, June). Penetration testing: Assessing your overall security before attackers do. Retrieved from http://www.sans.org/reading_room/analysts_program/PenetrationTesting_June06.pdf Penetration Testing Execution Standard. (2012, October 13). Pre engagement. Retrieved from http://www.pentest-standard.org/index.php/Pre-engagement Penetration Testing Execution Standard. (2012, October 13). Reporting. Retrieved from http://www.pentest-standard.org/index.php/Reporting Searle, J. (n.d.). Ami penetration test plan. Retrieved from http://www.smartgrid.epri.com/doc/AMI-Penetration-Test-Plan-1-0-RC3.pdf Wirelessdefence.org. (2010). Penetration testing tools listing. Retrieved from http://www.wirelessdefence.org/Contents/PenTest_ToolsList.htm[pic]

You May Also Find These Documents Helpful

  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Bradley, Tony, (2012). Introduction to Intrusion Detections Systems (IDS). Retrieved September 5, 2012 from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Penetration testing, on Web applications and Web servers is a critical step in ensuring the confidentiality, integrity, and availability (CIA) of the Web application or service. If e-commerce or privacy data is entered into the Web application, the company is bound by compliance laws and standards to ensure the confidentiality of customer data. It is especially critical when the Web application requires customers to input private data.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    There are several steps that need to take place while planning and executing a penetration test. The first is the planning and preparation stage. During this stage, penetration testers and management personnel should hold a meeting to determine the exact scope, goals, and method of the penetration test. Failure to do this will only result in a list of exploitable vulnerabilities without any type of prioritization or guidelines for the organization. Since these tests can cause networks to crash or connectivity to slow tremendously, it is very important the penetration testers know what kinds of tests are and are not acceptable to management. Legal documents should also be drafted during this time to protect the penetration testers. Since the testing involves acts that would normally be illegal and could compromise confidential information, these documents can outline how the information will be handled, returned and/or destroyed. A liability waiver should also be included to protect the testers from and ramifications of any system damage during the test.…

    • 591 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Web Application Security

    • 341 Words
    • 2 Pages

     Auditing standards  Web Penetration Testing Steps  Passive Mode    Gathering information Tools used Active Mode Domains covered          Configuration Management Testing Business Logic Testing Authentication Testing Authorization Testing Session Management Testing Data Validation Testing Denial of Service Testing Web Service Testing…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Penetration testing is designed specifically to identify the existing vulnerabilities in the target organization and then trying to exploit them to gain access, extract maximum possible sensitive information in a way an attacker would do. The final result will reflect the deep analysis of business risk poses to the organization by showcasing the process of how can attacker could d extract critical business information by exploiting the existing one or more vulnerabilities.…

    • 730 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The internet is rapidly becoming the greatest infrastructures for electronic commerce. The main reason for this is , it offers business to link with other business and individual in an easy manner and at low cost. The process of buying and selling of products or services over electronic systems like Internet , computer networks is the simple model of e-commerce. Although most of the commercial transactions are still taking place by the conventional channels , the trend of using Internet for electronic commerce has been increasing rapidly. The total e-commerce spent by a customer and business surpassed by $5 trillion in 2006 (Kenneth C Lauden,2006).…

    • 754 Words
    • 3 Pages
    Good Essays