Academic Writing Experts For Your Research Projects

Order custom papers, masters thesis and dissertation in 3 guided steps; human written!

Posted: December 9th, 2022

Quality Web Design

Quality Web Design (QWD) Security Weaknesses Steve Gelin Submitted to: Jack Sibrizzi SE571: Principles of Information Security and Privacy Keller Graduate School of Get research paper samples and course-specific study resources under   homework for you course hero writing service - Manage ment Submitted: 8/25/2014: 2024 - Essay Writing Service. Custom Essay Services Cheap Table of Contents Executive Summary3 Company Overview3 Security Vulnerabilities3 Software Vulnerabilities4 Hardware Vulnerabilities4 Recommended Solutions5 A Hardware Example Solution5 A Software Example Solution5
Impact on Business Processes5 Summary5 References6 Executive Summary My paper focuses on a security assessment of Quality Web Design (QWD), which is a very successful company that is well-known for its magnificent and appealing websites; they work on trying to get your company or business in the top 10 search engine results so that searchers find you on the first page of the search results.
They have a competitive pricing scheme going on, they offer many different options for their website construction, and they start by offering the customer a selection of pre-designed websites that they themselves can customize with their individual logos, text, images, themes or just a whole different template and any other information that would be helpful in catching the eye of potential customers. Company Overview

Quality Web Design (QWD) is a business that specifies and focuses on Web site, Web development, content design, programming, graphic design, photo editing and logo design for all types of businesses. QWD is a web graphic design and development company based out of Orlando, Fl. QWD cater to a huge and diverse clientele that ps across USA, UK and Canada. Security Vulnerabilities: Software Vulnerabilities Listed further down are two security vulnerabilities: software and hardware.
These security vulnerabilities were identified through the initial verification of the QWD software usage for their web design company. A majority of QWD personnel require out of office access when working on projects for the company, so the use of Virtual Private Networks called (VPN’s), Outlook Web email, Microsoft SQL 2008 - Affordable Custom Essay Writing Service | Write My Essay from Pro Writers Server and Microsoft Exchange 2007 email servers which utilize the corporate intranet resources.
Remotely utilizing these programs or software out of the company will cause QWD to be exposed to attacks from the internet. But not only that, employees put the utilization of corporate equipment such as desktops, laptops & mobile devices (iPhones and Windows Mobile 6) in very harmful situations that the company will pay for dearly later as time progress. Having these equipment listed it is possible to incur outside attacks from the internet while utilizing the company intranet resource on a remote computer that is not protected.
As I’ve read the different equipment listed within the QWD company it seems that there employee laptops, & mobile devices are being used unprotected over the internet which could lead to situations such as Trojan horses and email worms. For example Microsoft Exchange 2007 email servers has a well-known vulnerability that could allow remote code execution, this vulnerability can allow an attacker to take control of your affected system with Exchange Server service account privileges or the attacker could just disable your services within Microsoft Exchange completely.
Hardware Vulnerabilities The same can be said for the companies hardware systems listed such as their iPhones and Windows Mobile 6, these hardware devices that employees of QWD are devices that can easily be hacked by an outside user for example the iPhone 4 has a vulnerability that allows an intruder to be able to act silently and retrieve e-mail messages, SMS messages, calendar appointments, contact information, photos, music files, videos, along with any other data recorded by iPhone apps.
The same can be said for their Windows Mobile 6 devices, there’s a well know issue with the Bluetooth function in all Windows Mobile 6 devices. This issue allows an individual to read or write any file that’s on your mobile device, even the Internet Explorer on Windows Mobile 6 and Windows Mobile 2003 for Smartphones allows attackers to cause a denial of service; which the attacker then uses to infiltrate your device to retrieve e-mail messages, SMS messages, and calendar appointments, contact information etc.
From my research the only workaround provided for this vulnerability is not to accept pairing nor connection requests from unknown sources. So it would be better if the individuals who are using devices with Windows Mobile 6 as their operating system should be very mindful and careful of the things that they allow their devices to connect to. Recommended Solutions:
For QWD the installation of anti-malware to protect against malicious applications, spyware, infected SD cards and malware-based attacks against their mobile or hardware devices such as iPhones, laptops etc. Strongly enforce security policies, such as mandating the use of strong PINs/Passcodes, use SSL VPN clients to effortlessly protect data in transit and ensure appropriate network authentication and access rights finally centralize locate and remote lock, wipe, backup and restore facilities for lost and stolen devices.
As for software vulnerabilities the use of firewalls, on both laptops and desktops, anti-malware and spyware programs that will protect against malicious activities, updated software patches with the latest updates to security threats, the use of strong passwords and pass keys, when sending information over the internet whether classified or unclassified he use of an encryption tool to keep that information from being intercepted. Impact on Business Processes:
As we all know as IT professional, there can be a lot of different impacts that can affect work progress within a company such as password update reminders, the cost that will be needed to implement these new changes, what would be the privacy, rules and regulations for these devices. Not only will these new changes cause confusion for the first few months of the change up, they may also cause employee’s to feel paranoid of the thought that their system could be compromised and that there being asked to constantly update things within their system.
Summary: In summary this paper focuses on the vulnerabilities of QWD as a Web Design and development company, the software and hardware vulnerabilities of their system and the needed recommended solutions for all devices such as their iPhones and Windows Mobile 6 usable devices. These devices left unchecked can cause major issues to the company if such items were attacked and used to an attackers benefit. QWD as an organization must assess the situation with their software and hardware vulnerabilities and commence the proper and needed steps to counter these problems within QWD.
References: Degerstrom, J. (2011). Browser Security and Quality Web Design. Retrieved from http://www. jimdegerstrom. com/blog/2011/05/browser-security-and-quality-web-design. html Lowe, S. (2009). Patch these critical vulnerabilities in Exchange Server. Retrieved from http://www. techrepublic. om/blog/datacenter/patch-these-critical-vulnerabilities-in-exchange-server/611 Hamell, D. (2010 - Essay Writing Service: Write My Essay by Top-Notch Writer). Malicious Mobile Threats Report. Retrieved from http://juniper. mwnewsroom. com/manual-releases/2011/At-Risk--Global-Mobile-Threat-Study-Finds-Security Norman, G. (2009). Windows Mobile 6. 0 Users Beware of Bluetooth Vulnerability. Retrieved from http://www. findmysoft. com/news/Windows-Mobile-6-0-and-6-1-Users-Beware-of-Bluetooth-Vulnerability/ Greenberg, A. (2011). iPhone Security Bug. Retrieved from

Tags: reliable instant online homework help services, homework for you free essay, help with class coursework, help in writing assignment, Top-rated assignment assistance online, School Exam Study: Homework Helper App Online

Why choose Homework Ace Tutors

You Want Quality and That’s What We Deliver

Top Academic Writers

We’ve put together our writing team with care, choosing talented writers who shine in their fields. Each one goes through a tough selection process, where we look for folks with deep expertise in specific subjects and a solid history of academic writing. They bring their own mix of know-how and flair to the table, making sure our content hits the mark—packed with info, easy to read, and perfect for college students like you.

College Prices

We don’t do AI-written essays or copycat work—everything’s original. Competitive pricing is a big deal for us; we keep costs fair while delivering top-notch quality. Our writers are some of the best out there, and we charge rates that stack up well against other services. This means you get stellar content without draining your wallet. Our pricing is straightforward and honest, built to give you real value for your money. That’s why students turn to us for high-quality writing services that won’t break the bank.

100% Plagiarism-Free

Academic integrity is at the heart of what we do. Every paper starts from scratch, with original research and writing tailored just for you. We write 100% authentic—no plagiarism research essays. Our strict quality control process includes scanning every draft with top tools like SafeAssign and Turnitin, so you get a similarity score and proof of originality. We’re obsessive about proper citation and referencing too, crediting every source to keep things legit. It’s all about giving you peace of mind with content that meets the highest standards.

How it works

When you decide to place an order with Dissertation Writer, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went and the marking criteria grade you scored. You can leave a review recommending a writer for your class and course mates.