PROJECT MANAGEMENT2 Introductory letter To: CEO State of Pennsylvania HIE network Thanks for offering us an opportunity to serve you. Our esteemed team of four offers a comprehensive, efficient, and cost-effective IT security services. As our norm, we will address any of your company IT security services in an innovative and dynamic approach. The need for the mock-up test is due to rarely enough time to test to showcase our abilities. The mock activities will involve; Establishing Pennsylvania HIE network security policy Establishing Pennsylvania HIE network data communication policies Pinging the organizational server Provide firewall activities report This project book will notebook will detail all the activities to be carried chronologically. Also, this document will detail our expected compensation package, risk management matrix, a communication plan for our group. The overall goal is to improve the Pennsylvania HIE IT security structure. The cost of services overview Dollars 1Project management Project Manager960 Project team members1920 2Hardware Handheld devices100 Servers7000 3Software Licensed software100 Testing process2340 2440 Resource cost overview
PROJECT MANAGEMENT3 Task cost overview Use cases
PROJECT MANAGEMENT4 Use case ID:SQL injection Created By:Pennsylvania HIE networkLast Updated By:J. Doe Date Created:11/01/2020Last Revision Date: Description:Security test to Pennsylvania HIE networkbuyer through SQL injection toview data that is not normally retrieved Actors:Project managers Preconditions: 1. Pre-approval byPennsylvania HIE network 2. Connecting to the organization database 3. Developing SQL commands Flow: 1. Pre-approval byPennsylvania HIE network 2. Connecting to the organization database 3. Developing SQL commands 4. Running the SQL commands 5. Displaying of results 6. Analyzing results Requirements: The following requirements must be met before execution of the use case 1. Must be connected to the server database 2. Database back-up needs to be done prior to performing of SQL injection
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
PROJECT MANAGEMENT5 Use case ID:Risk assessment Created By:Pennsylvania HIE networkLast Updated By: Date Created:11/01/2020Last Revision Date: Description:Evaluating security risks of a system Actors:Project managers Preconditions: 1. Pre-approval byPennsylvania HIE network 2. Connecting to the organization database Flow: 1. Pre-approval byPennsylvania HIE network 2. Reviewing of the current risk policy 3.Updating risk policy
PROJECT MANAGEMENT6 Use case ID:Penetration testing Created By:Pennsylvania HIE network Last Updated By:J. Doe Date Created:11/01/2020Last Revision Date: Description:Security test to Pennsylvania HIE network Actors:Project managers Preconditions:1. Pre-approval byPennsylvania HIE network 2. Connecting to the organization database Flow: 1. Pre-approval byPennsylvania HIE network 2. Selecting pen-test tool 3.Performing actual penetration testing
PROJECT MANAGEMENT7 Evaluation matrix INDICATORDEFINITIONBASELIN E TARGETDATA SOURCE FREQUEN CY RESPONSIB LE REPORTIN G GoalPinging the organization server to find out the available vulnerabilities and threats. Executing SQL injection to the server to view data that is not normally retrieved The time the server takes to respond to a request The time it takes to respond to an SQL injection 0.5 0.3 1.0 1.0 Response time in milliseconds Time in milliseconds Everyday After every three hours Project manager Monthly enrolment report OutcomesNumber of packets sent and received Error detection Measures round time for messages sent. 0.70.67Response time in seconds Twice a dayAll project team Daily reports OutputsNumber of packets successfully a sent via the organization network Time used to send the packets per second. 0.60.8Data portDailyProject manager Daily reports
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
PROJECT MANAGEMENT10 Personal assignments Personal assignmentTasks JoeVulnerability assessment/ Meet with the CEO of the organization RichardSQL injection/ Prepare mock-up report KennethPenetration testing / conduct training JohnFirewall log analysis/ Meet with other organization stakeholders and write minutes