Analyze three specific potential malicious attacks

Assignment Help Computer Network Security
Reference no: EM131380164

Assignment: Identifying Potential Malicious Attacks, Threats and Vulnerabilities

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls

5) 2 - Windows Server 2012 Active Directory Domain Controllers (DC)

2) 1 - Web / FTP server

6) 3 - File servers

3) 1 - Microsoft Exchange Email server

7) 1 - Wireless access point (WAP)

4) 1 - Network Intrusion Detection System (NIDS)

8) 100 - Desktop / Laptop computers

 

9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

Write a four to five page paper in which you:

1. Analyze three specific potential malicious attacks and / or threats that could be carried out against the network and organization.

2. Explain in detail the potential impact of the three selected malicious attacks.

3. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

4. Analyze three potential concerns for data loss and data theft that may exist in the documented network.

5. Explicate the potential impact of the three selected concerns for data loss and data theft.

6. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.

7. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131380164

Questions Cloud

Describe distribution and summarize the important feature : Describe the distribution and summarize the important features. What is it about running that might account for the shape you see?
Compose a thought provoking inquiry : Compose a thought provoking inquiry along with A analysis/reflection prepared, to engage in class discussion. Please use Sub heading title for the question and sub heading title for the analysis/reflection?
Has the accounting profession created a situation : Has the accounting profession created a situation in which the auditors' ethical behavior is impaired by their professional obligations?
Explain how the auditors legal liability might increase : A failure to meet these modified standards could increase a practitioner's exposure to legal liability. - Explain how the auditor's legal liability might increase as a result of changes to the audit report discussed.
Analyze three specific potential malicious attacks : Analyze three specific potential malicious attacks and / or threats that could be carried out against the network and organization. Explain in detail the potential impact of the three selected malicious attacks.
Competitive cell phone market has demand curve : Assume that a competitive cell phone market has a demand curve described by the equation. What are the consumer and producer surpluses in this market? What is the deadweight loss (DWL) if a price ceiling is set at Pmax = $19?
Why would such payments by utstarcom violate the fcpa : Do you believe it is ethically appropriate to allow such a defense when illegal payments are made? Why or why not?
What measures of center and spread are most appropriate : Without doing any calculations, which must be larger: the median or the mean? Explain how you know.
Advise anna as to her case for negligence against trevor : BUS503 PRINCIPLES OF COMMERCIAL LAW ASSESSMENT TASK. Trevor is the sole owner and operator of "Honey Bee Nature Appreciation Tours" (HB).  He operates walking tours of Bushland surrounding the Bunya Mountains. Advise Anna as to her case for Neglige..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

  Application of principles of ethics to ict-related issues

Demonstrate factual knowledge, understanding and the application of principles of ethics to ICT-related issues and demonstrate depth of analysis by examining arguments for one ethical issue related to ICT

  Explain network security management-flow diagram

Network Security Management-flow diagram, assets and detail of functions. I have completed the assets and flow diagrams and interfaces. Start systems engineering on for MIIS, based on prior homework assignments:

  Use javascript to implement rsa including encryption

Use JavaScript to implement RSA including Encryption.

  Research and devise a plan to thwart malicious code

Research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created deviant code

  How is the security of a firms information system affected

How is the security of a firm's information system and data affected by its people, organization, and technology

  How security can be configured and provide configuration

Describe how the security can be configured, and provide configuration examples (such as screen-shots and configuration files). Marks are based on demonstrating technical detail and understanding, and choice of examples.

  Strategy for dealing with the risk

For each malicious attack and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  Summarize the current state of web application security

Summarize the current state of Web application security for your Board of Directors to understand. Determine any common themes that need to be addressed specific to the Web security.

  Describe the purpose of a risk assessment

Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment. Select risk assessment methodology and give your rationale behind the one you chose.

  Explain advantages of business continuity planning

Write a 3-5 page report focusing on the advantages and disadvantages of Business Continuity Planning in a financial organization under the Incident Command System.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd