Market Penetration

In: Business and Management

Submitted By adupadhyay2010
Words 1982
Pages 8
ACKNOWLEDGMENT

A lot of guidance and support was needed to complete this report. It was a

Work in which, I have seen the external world with same eyes but in different perception.

I would like to express my deep sense of gratitude to Mr. Vishal Goel for giving me the

opportunity as they proved to be a constant source of inspiration providing unstained

support at all stages of the project work.

Acknowledgement must be given to honorable Director Mr. Sanjeev Gupta (IMR

Ghaziabad) who provided me a proper guidance to do the Research project and attain the

standard.

Lastly, I would like to thank my parents for being the guiding force through all

the phases of my life.

Doing my project on this topic was a wonder opportunity for me, for it instilled

in me a great deal of confidence and ability to work hard and thereby face challenges.

Vikas Kr Gupta P.G.D.M 3rd sem I M R Ghaziabad 3

Table of contents

S. No Description Page No. 1 Executive summary 5

2 Objective of Research 7…...

Similar Documents

The Social Penetration Theory

...The Social Penetration Theory People often times fail to realize how their communication can greatly impact their social interactions as well as aid in the formation of strong intimate relationships they may hold with their friends or even their significant other. We use communication in many forms, whether verbal or non-verbal to gain a better understanding of one another and to reduce our uncertainty towards each other. By allowing ourselves to take part in the communication process, we therefore are able to disclose and exchange information which in turn aids in forming an intimate relationship better known as the social penetration theory. The theorists Altman and Taylor define the social penetration theory as something that identifies the process of increasing and decreasing self-disclosure and intimacy within a relationship. This normally occurs as two individuals engage in sharing information whether it is through traditional verbal means or as most common in today’s society, non-verbal means such as through the use of text messages and emails, to disclose personal information. When disclosing information about one’s self, there are typically three phases or stages people tend to go through in order to reach a more intimate state of sharing information which are the cultural, sociological and psychological exchange of information. People typically tend to go through each phase before getting to a state where they can establish they have reached a more intimate......

Words: 1533 - Pages: 7

Penetration Test Plan

...Malcolm Testing Solution’s Penetration Test Plan Customer: The Fitness Club Introduction: The Fitness Club has already been victim to hacking that took place on their web server. They are unsure if this occurred due to a former administrator who quit or if by an external party. Malcolm Testing Solutions has been tasked with creating a penetration test plan to prevent further acts of attack on the Fitness Club’s network. The objective of the assessment is to provide feedback to The Fitness Club with respect to its ability to preserve the confidentiality, Integrity, and availability of the information maintained by and used by its origination. Malcolm Testing Solutions will test the use of security controls used to secure sensitive data. Services Overview: This project shall include 1 consultant for a time period of 2 days onsite at a single customer location to provide internal penetration test services. Malcolm Testing Solutions will provide tools, knowledge and expertise to execute an internal penetration test on customer designated devices. Malcolm Testing Solutions will attempt to compromise the access controls on designated systems by employing the following methodology: 1. Enumeration – Once Malcolm Testing Solutions has arrived for The Fitness Club’s assessment they will connect to the network via the data port provided by the customer. Once connected, Malcolm Testing Solutions will run a variety of information gathering tools in order to enumerate computers and......

Words: 566 - Pages: 3

Network Penetration Testing

...FULL BREACH PENETRATION TEST   1. Reconnaissance.   a.    Establish active and inactive routes into the property. b.    Establish Contractor routines (Cleaners, Builders, Electricians, Technician etc) c.    Establish Courier routines d.    Establish employee routines, (Social Engineering) e. Obtain ID card/s, (Theft or Falsify)   2. Gain entry to the building. (Pretext, Deceit, Employment)   a.    Establish Office layout b.    Establish Sensitive offices (Including ComCen and IT rooms) c.    Establish Evacuation routines    3. Acquisition of Intelligence.   a.    Obtain Hard & Soft Copy Information b.    Obtain Top Managerial Personal Information, (Addresses etc) c. (Optional deployment of Ethical Hacking)   4. Disruption/Sabotage   a.    Insertion of dummy explosive/incendiary devices (Packages, Letter Bombs etc). b.    Abduction plan 5. Report The time frame is variable dependent on current security protocols and staff awareness. Client Network Penetration Testing Proposal Document Reference xxx-xxxx-xx Contents 1 Background 3 2 Scope 4 2.1 Types of Attack 4 2.2 Report 5 2.2.1 Executive Summary 5 2.2.2 Technical Report 5 2.2.3 Recommendations 5 2.2.4 Security Policy 5 3 Phase 1 – Internal 6 3.1 Scope 6 3.2 Deliverable 6 4 Phase 2 – Internet 7 4.1 Scope 7 4...

Words: 2185 - Pages: 9

Impact and Penetration of Nursing Research

...Impact and Penetration of Nursing Research It is common nursing knowledge that patient quality of care is directly related to improved outcomes and is based on the safety of the patient. Nurses play a direct role in a patient’s quality of care, because nurses have the most direct contact with the patient. The issues that I noticed in each of the website’s evidence based practices (EBP’s) include nursing education level, staffing levels, working environments, and organizational policy/procedure and infrastructure. According to our Keele text (2007), nurses are expected to know and practice evidence based care to create the best outcome for the individual patient (Keele, 2007, p. 9). Nurses play a significant role in all patient outcomes due to their responsibilities for practicing and advocating for specific standards of practice outlined by EBP and defined within their scope of practice and the Nursing Code of Ethics. Therapeutical nursing practices include not just implementing treatments, but evaluating those treatments’ outcomes. Nursing research is essential in determining patient safety issues and improving patient outcomes due to the nurse being the closest point of care provider for the patient. It is the nurse’s observations that help direct and manage the path that a patient’s care may take. With the nurse as the closest observer of the patient, it only makes sense that nurses play the intricate role in the research of patient improvements or disparities, alike,......

Words: 680 - Pages: 3

Attack and Penetration Test Plan

...Attack and Penetration Test Plan Part 1: Table of Contents 2. Scope 3 .Goals and Objectives 4. Tasks 5. Reporting 6. Schedule 7. Unanswered Questions 8. Authorization Letter Part 2: Scope Production e-commerce Web application server and Cisco network. Located on ASA_Instructor, the e-commerce web application server is acting as an external point-of-entry into the network: • Ubuntu Linux 10.04 LTS Server (TargerUbuntu01) • Apache Web Server running the e-commerce Web application server • Credit Card transaction processing occurs The test will be intrusive, meaning specific security points will be passed. Part 3: Goals and Objectives • If security software is up to speed, and penetration is not possible, a positive result will be given. If security software is not what it should be, penetration will be easy and the results will be explained to you in a separate report. Part 4: Tasks • Determine website size • Determine code of the website Part 5: Reporting • Upon completion of the penetration test, all results found will be in a separate report written by the person whom is performing the test. Part 6: Schedule Phase One-Information Collection (2 days) 1. Client authorization letter 2. Further client information 3. Get IT infrastructure Phase Two-Test Plan Development (3 days) 1. Determine scope 2. Use IT infrastructure to gain further knowledge about what is to be penetrated 3. List things to be penetrated and things that are off limits Phase...

Words: 458 - Pages: 2

Ps3 Penetration Strategy

...Study With Sony On Penetration Pricing As Global Pricing Strategy Meaning of Penetration Pricing This is a marketing strategy used by firms to attract customers to a new product or service. Penetration pricing is the practice of offering a low price for a new product or service during its initial offering in order to attract customers away from competitors. The reasoning behind this marketing strategy is that customers will buy and become aware of the new product due to its lower price in the marketplace relative to rivals. It can often increase both market share and sales volume. Additionally, the high sales volume can also lead to lower production costs and higher inventory turnover, both of which are positive for any firm with fixed overhead. The tagline “special introductory offer” is the classic sign of penetration pricing. The aim of penetration pricing is usually to increase market share of a product, providing the opportunity to increase price once this objective has been achieved. Penetration pricing is, therefore, the pricing technique of setting a relatively low initial entry price, usually lower than the intended established price, sometimes lower than the costs too, to attract new customers. The strategy aims to encourage customers to switch to the new product because of the lower price. Penetration pricing is most commonly associated with a marketing objective of increasing market share or sales volume. In the short term, penetration pricing is likely......

Words: 4316 - Pages: 18

Penetration Testing

...Using penetration testing to enhance your company's security Based on the fundamental principle that prevention is better than cure, penetration testing (pen-testing) is essentially an information assurance activity to determine if information is appropriately secured. Conducted by penetration testers, sometimes referred to as ‘white hats’ or ethical hackers, these tests use the same tools and techniques as the bad guys (‘black hat hackers’), but do so in a controlled manner with the express permission of the target organization. Vulnerability scans versus pen-testing A common area of confusion is the relationship between vulnerability scanning (automated) and pen-testing (expert-driven manual testing). Both involve a proactive and concerted attempt to identify vulnerabilities that could expose the organization to a potential malevolent attack. Vulnerability scanners are great at identifying ‘low-hanging’ vulnerabilities, such as common configuration mistakes or unpatched systems that offer an easy target for attackers. What they are unable to determine is the context or nature of the asset or data at risk. They are also less able than humans to identify unknown-unknowns (things not already on the risk register, or which haven't been theorized by the organization as potential security issues). Good pen-testing teams, however, do this very well. For instance, pen-testers can give countless examples of engagements where an environment was previously scanned only for......

Words: 1752 - Pages: 8

Penetration Testing

...Goals and Objectives 6 3. Penertation testing Methodology 2.1 Penetration test plans 2.2 NIST penertation testing documentation 2.3 Web application penertation testing 2.4 E-commerece penertation testing 2.5 Network penetration testing 2.6 Common tools and applications for peneration testing 7 2.7 Black box testing, grey box testing, Black/grey box testing 2.8 Social engineering testing 7 3. Test Plan 15 3.1 Task 3.1 Reporting 3.1 Schedule 3.2 Limitation of Liability 3.3 End of Testing 3.1 Unanswered Questions 10 3.4 Signatures 8 3.1 Authorization Letter 8 4. Conclusion 11 5. Bibiography 11 Acronyms 22 Appendix A – Test Case Procedures 23 Abstract This document is a proposal with a series of activities undertaken to identify and exploit security vulnerabilities. It helps confirm the effectiveness or ineffectiveness of the security measures that have been implemented. This proposal provides an understanding of penetration testing. It discusses the benefits, the strategies and the mythology of conducting penetration testing. The mythology of penetration testing includes three phases: test preparation, test and test analysis. Key Words: Security Testing, Vulnerability Assessment, Penetration Testing, Web Application Penetration Testing. What is a Penetration test? Penetration tests are a great way to identify vulnerabilities that exists......

Words: 1995 - Pages: 8

It Penetration Testing

...Institute Author Retains Full Rights This paper is from the SANS Penetration Testing site. Reposting is not permited without express written permission. Interested in learning more? Check out the list of upcoming events offering "Hacker Techniques, Exploits & Incident Handling (SEC504)" at http://pen-testing.sans.org/events/ Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 A Management Guide to Penetration Testing David A. Shinberg © SANS Institute 2003, © SA NS In sti tu As part of GIAC practical repository. te 20 03 ,A ut ho rr Version 2.1a eta Practical Assignment ins SANS Hacker Techniques, Exploits, and Incident Handling (GCIH) fu ll r igh ts. Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Abstract Penetration tests are an excellent method for determining the strengths and weaknesses of a network consisting of computers and network devices. However, the process of performing a penetration test is complex, and without care can have disastrous effects on the systems being tested. This paper provides guidance, primarily focused around planning and management, on how to conduct a penetration test comprised of five phases – Preparation, Public Information, Planning, Execution and Analysis and Reporting. However, due to the technical and sometimes sensitive nature of penetration testing only a cursory overview how to compromise......

Words: 4111 - Pages: 17

What Is Penetration Testing?

...What is penetration testing? Penetration testing is a way of trying to exploit the weaknesses of an organizations security defenses. Penetration testing may come in many forms and test different types liabilities. A few years ago people debated as to whether or not penetration testing was even needed. Now most people realize it is absolutely necessary. Although most people, when thinking of security breaches, think of network security in relation to hackers, there are many other security areas that must be tested. Some of these areas are physical security, telecommunications security, and environmental security. Other areas that may be tested are operating systems and applications, and social engineering. All of these areas are vital to the security of an organization. A breach in any of these systems may cause great detriment to the organization financially and a degradation of customer trust. Application and username/password weaknesses may be tested by using automated tools. These tools may also be used to find harmful software (virus, malware) which may lead to unlawful access to a company’s system. The best penetration tools supply the following options: 1. Easily deployed, configured and used 2. Scans systems easily 3. Distinguishes weaknesses based on severity 4. Verification of weakness automated 5. Test weakness previously found to make sure they are no longer viable 6. Able to produce logs and reports on the weakness of the system Not all......

Words: 1495 - Pages: 6

Insurance Penetration

...INCREASING INSURANCE PENETRATION IN INDIA Insurance as an industry has secured a vital position in the development of the nation’s economy. An efficient insurance market is essential to achieve integration into the global economy and sustainable strong economic growth. In conjunction with the forces of global consolidation, current advances in information technology and the potential of e-business mark the beginning of a veritable efficiency revolution in the insurance industry. One of insurance's key roles is safeguarding the financial health of small and medium-sized enterprises. In addition to the protection provided by social security systems, insurance cover is crucial for people to insure themselves against inability to work, set aside money for retirement or protect themselves against the loss of their assets. Insurance reduces the investment risk faced by companies and the state. Many companies find it far more expensive, if not impossible, to take out a loan without purchasing the requisite insurance protection. Insured, thereby reduces the costs of raising the capital they need. By reducing investment risk, insurance can also encourage companies to think more long term and increase their risk tolerance. A lot of investments in new production facilities and newly founded companies would never happen if every company was required to have the necessary financial means to make good every conceivable loss. While arguable, it is no exaggeration that the......

Words: 2524 - Pages: 11

Increasing Insurance Penetration in India

...INCREASING INSURANCE PENETRATION IN INDIA Insurance as an industry has secured a vital position in the development of the nation’s economy. An efficient insurance market is essential to achieve integration into the global economy and sustainable strong economic growth. In conjunction with the forces of global consolidation, current advances in information technology and the potential of e-business mark the beginning of a veritable efficiency revolution in the insurance industry. One of insurance's key roles is safeguarding the financial health of small and medium-sized enterprises. In addition to the protection provided by social security systems, insurance cover is crucial for people to insure themselves against inability to work, set aside money for retirement or protect themselves against the loss of their assets. Insurance reduces the investment risk faced by companies and the state. Many companies find it far more expensive, if not impossible, to take out a loan without purchasing the requisite insurance protection. Insured, thereby reduces the costs of raising the capital they need. By reducing investment risk, insurance can also encourage companies to think more long term and increase their risk tolerance. A lot of investments in new production facilities and newly founded companies would never happen if every company was required to have the necessary financial means to make good every conceivable loss. While arguable, it is no exaggeration that the availability of......

Words: 2524 - Pages: 11

Insurance Penetration in India

...1st Prize Winner – Shri Devaraj Belke Mahadeva, NIA, Pune INCREASING INSURANCE PENETRATION IN INDIA Insurance as an industry has secured a vital position in the development of the nation’s economy. An efficient insurance market is essential to achieve integration into the global economy and sustainable strong economic growth. In conjunction with the forces of global consolidation, current advances in information technology and the potential of e-business mark the beginning of a veritable efficiency revolution in the insurance industry. One of insurance's key roles is safeguarding the financial health of small and medium-sized enterprises. In addition to the protection provided by social security systems, insurance cover is crucial for people to insure themselves against inability to work, set aside money for retirement or protect themselves against the loss of their assets. Insurance reduces the investment risk faced by companies and the state. Many companies find it far more expensive, if not impossible, to take out a loan without purchasing the requisite insurance protection. Insured, thereby reduces the costs of raising the capital they need. By reducing investment risk, insurance can also encourage companies to think more long term and increase their risk tolerance. A lot of investments in new production facilities and newly founded companies would never happen if every company was required to have the necessary financial means to make good every......

Words: 2533 - Pages: 11

Conducting a Penetration Test on an Organization

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Conducting a Penetration Test on an Organization This document is decided to give readers an outlook on how a penetration test can be successfully done on an organization. A methodology has been drawn out in this document to allow readers to be acquainted with the process that penetration testers go through to conduct a penetration test. AD Copyright SANS Institute Author Retains Full Rights Conducting a Penetration Test on an Organization TABLE OF CONTENTS PAGE 2 What is a Penetration Test? 2 fu ll r igh ts. Abstract eta ins The Process and Methodology Planning and Preparation Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Information Gathering and Analysis Vulnerability Detection Penetration Attempt Analysis and Reporting Cleaning Up rr Limitation of Penetration Testing ut ho Conclusion 10 10 Appendix A: Netcraft (www.netcraft.com) results on www.sans.org 12 Appendix B: Penetration Testing Tools 14 tu te 20 ,A 11 02 Bibliography 3 3 4 6 7 9 9 sti DETAILS © SA NS In Full name: Chan Tuck Wai GIAC userID: twchan001 Course: Security Essentials Version: First (Original Submission) Conference Location: Malaysia Key......

Words: 5638 - Pages: 23

Penetration of Ict in India

...great challenge for the Government of India and its policy makers. It’s still a situation of dilemma to balance between the policies to be drafted for food security and the policies which will improve the income of farmers in the situation where the food prices are hiking along with the population count. The agriculture in India is being constrained by the availability of land, knowing this; improving food productivity remains an important factor to be taken care of while addressing the future of Food Security in India. The most crucial sources of growth in productivity, cited by various literatures are research, infrastructure, literacy and extension. Improving input-output interface of market is important for growth in productivity which can be achieved by development of markets. Education and knowledge access enable farmers to acquire information regarding technical and allocative matters and use them for purpose of decision making effectively. This increases the adoption of technology and modern inputs such as fertilizers and machines which subsequently leads to improved yield. Agricultural extensions are playing an important role in development of agriculture and promoting inclusive, sustainable and economic development that is pro poor. Also availability of ICTs and its usage can put tremendous positive impact on reduction of poverty and sustainable development. Extension services not only help the farmers in the dissemination of information regarding......

Words: 2841 - Pages: 12