logo

Cyber Security Programming Proposal for Threat Modeling and Testing Tool

   

Added on  2023-06-03

4 Pages702 Words57 Views
Cyber Security Programming- Proposal
Names
Institution
Professor
Course
Date
Cyber Security Programming Proposal for Threat Modeling and Testing Tool_1
Project description
The prospective tool would be composed of several modules. The first aspect would be
choosing suitable programming language for designing user interface (Klavans, 2015). The
executable program would be an “eye lookup” monitoring over the internet to check on open
ports to information systems. While on the internet, the prospective tool would keep sending data
packets to different data channels in order to evaluate its own vulnerability as well as other
systems. Once an open port has been detected, a signal would be send to the operator with all
details. At the same time, a data packet would be conveyed to target system by converting its
address to make it look as if it is an attack from outside (Buckley, Zalewski & Clarke, 2018).
This would be meant to evaluate if the firewall would detect the signal and classify it as a threat.
If the data packet does not have some identifiable information, it should be discarded, otherwise,
it would be a valid packet. In this regard, a cycle of threats would keep flowing to the target
system making it more secure.
Tool Uniqueness
Most of the tools in the market are specific to a particular target instead of providing a
wide range of functionalities to users. With this system, it would be possible to use it as a
security tool as well as threat modeling and testing tool. With these features, it would be a unique
tool that can be used to reduce organization’s operational costs. Similarly, due to its design
complexity, simple interface design would be adopted. There would be clear boundaries between
attacking and preventing interfaces. From these two features, prospective tool would be of great
use in the market.
Cyber Security Programming Proposal for Threat Modeling and Testing Tool_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security
|5
|750
|448