Attacking more than just the enterprise

Assignment Help Computer Networking
Reference no: EM13766696 , Length: 1200 words

Attacking More Than Just the Enterprise

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry. Read the article titled, "Verizon DBIR 2012: Automated large-scale attacks taking down SMBs" located at the following SearchSecurity link: https://searchsecurity.techtarget.com.au/news/2240147412/Verizon-DBIR-2012-Automated-large-scale-attacks-taking-down-SMBs.

Write a three to four (3-4) page paper in which you:

  • Evaluate the recent trend toward attacking small and medium businesses and identify the benefits that these types of businesses have which attract attackers.
  • Compare and contrast the digital forensic operations of small-sized companies to large companies in terms of costs, personnel, inexperience, naivety, etc.
  • Explain the common purpose of attacks on point-of-sale (POS) systems and identify why you as a security professional would have cause for concern for your customers' POS systems.
  • Assess why and how these POS systems have become a prime target for hacking groups.
  • Examine the forensics challenges that exist for investigations on POS systems.
  • Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Outline system forensics issues, laws, and skills.
  • Describe and analyze practices in obtaining digital evidence.
  • Use technology and information resources to research advanced issues in computer forensics.
  • Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

 

Reference no: EM13766696

Questions Cloud

Conversation between two employees of linquest technologies : The following is an excerpt from a conversation between two employees of Linquest Technologies, Don Corbet and Rita Shevlin. Don is the accounts payable clerk, and Rita is the cashier.
Engineer concern about the overhead rate : What is the engineer's concern about the overhead rate going "up and up"? What did the engineer mean about the large overhead rate being a disadvantage when placing bids and seeking new business?
Compute the book value per share : We know the following about Bob & Co. Total assets are $1000m, E is $700m, cash is $500m and the # of shares is 1m. We estimate that the market value of equity is 2 times the book value of it. Finally, a fire sale of the firm would bring 70% of the v..
Depreciation expense-capital expenses-debt-debt principal : Mary has EAT, depreciation expense, capital expenses, debt and debt principal payments of $2m, $2.8m, $1.3m, $40m and $1.5m respectively. Moreover, Mary had operating profit of $2.5 million and its assets went from a total of $35 to $38 million. Addi..
Attacking more than just the enterprise : Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.
Which type of business structure would be the worst : Sally Gomez is interested in starting a new business. Although Gomez has developed her business plan and is ready to implement her ideas, she lacks the necessary finances to begin her new business. Along with a lack of finances, Gomez worries about t..
Difference between accrual and cash accounting : What is the difference between accrual and cash accounting? When might an accountant use cash basis accounting without violating generally accepted accounting principles?
Determine the impact of potential logical threats : Determine the impact of at least five potential logical threats that require attention. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the ..
Principles of constructivist teaching : Explain and give examples showing how these tenets support science literacy.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd