Explain physical security and its associated challenges

Assignment Help Management Information Sys
Reference no: EM131199875

Term Paper: Current Attack Vectors and Secure Network Design

A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems infrastructure across three (3) locations: one (1) primary headquarters and two (2) small satellite offices. All three (3) locations will occupy one (1) entire floor of a multitenant building. Your friend has asked your opinion regarding major technology choices that he must make for his business, such as operating systems, mobile devices, cloud services, and wireless networking.

Write a six to ten (6-10) page paper in which you:

Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.

Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.

Consider the use of cloud providers to allow for access to data for employees and potential clients. Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.

Recommend the minimum physical and technical controls for protecting the company's intellectual property from both internal and external threats. Provide a rationale for your response.

Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.

Design a floor plan of each of the three (3) offices. Include locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Use the graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.

Explain and apply various hacking technologies and features that administrators deploy to protect their networks.

Review system (Linux and Mac OS X) and networking device hacking techniques and vulnerabilities.

Summarize wired and wireless networking devices and standards, including routers, cables, firewalls and access points, as well as the methods of hacking.

Explain physical security and its associated challenges.

Use technology and information resources to research issues in ethical hacking.

Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Reference no: EM131199875

Questions Cloud

Interaction-communication on some level : What might they be doing instead and what might those other activities do for their mental, emotional, and physical health? Have we lost touch with human interaction/communication on some level? Have we come so far that it is too late to get some ..
Define the spatial resolution and force resolution : Repeat this experiment for all your fingers, repeating the test several times on each finger. Compute the average and the standard deviation. Then perform the test on other subjects. Discuss your results. Do you notice large variations in the resu..
How financial information is communicated : What are this company's methods for accounting for receivables and evaluating uncollectible receivables? What types of fixed assets are acquired, and what methods are preferred for debt financing? How do those affect how financial information is comm..
What would be the ph of the rain at 298k : Calculate the volume (at 20°C and 1.00 atm) of SO2 produced by conventional roasting of 9.561 tonnes (9561 kg) of copper sulfide ore, CuS - Besides the assumption that the water does not spread out, what other factors may make this calculation incor..
Explain physical security and its associated challenges : Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.
Insert the missing figures : Insert the missing figures in the following examples.
Problem regarding the councerning behavior : In light of this week's scenario, I think the following article is very relevant in today's business environment, where unethical behavior is a major concern. I am asking a few students to consider the following article in the Harvard Business Re..
Define basic components of strategic information system plan : Describe the major types and classifications of health care information standards and the specific organizations that develop and regulate these standards. Discuss the need for, and identify methods of, accomplishing the security of information sys..
Determiningt the consumer purchase : If the consumer maximizes their utility subject to their budget constraint, how much of Good X and how much of Good Y will the consumer purchase?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Os and database security for an organization

OS and Database Security for an Organization

  Case study on social graphs

Case study on social graphs (the term coined by Mark Zuckerberg of Facebook) - The essay has to basically deal with the relatively new phenomenon of social networking.

  Research the key terms applications software

Research the key terms "Applications Software", "Application Design", "Software Design"; find a journal publication pertaining to the subject, and write a 1-2 pages APA format report, summarizing the paper.

  Database technology and mobile computing

Database Technology and Cloud Computing and Database technology and Mobile computing

  What are the efficiency savings of the proposed layout

What are the efficiency savings of the proposed layout? - What is the cost of the proposed layout? - In how many years can the cost of the new layout be recovered?

  Planning or using a new system

Planning or Using a New System - Have you been involved in either planning or using a new system? Discuss your experience. Was a SDLC (systems development life cycle) process used?

  Important information about technology road mapwhat is the

important information about technology road mapwhat is the purpose of a technology road map?what are the two main

  How the issues are approached by each sub-discipline

It has been postulated that clinical informatics and bioinformatics are working on the same problems, but in some areas one field has made more progress than the other. Identify three common themes. Describe how the issues are approached by each s..

  How efficient are electronic signatures

How efficient are electronic signatures -  DocuSign Electronic Signature Technology Increases Sales, Reduces Costs and Enhances Compliance.

  Csr and competitive advantage

This solution shows if a correlation between corporate social responsibility and a competitive advantage exists.

  Implement a new information technology into an organization

How important is it to understand the strengths and weaknesses of a particular information technology - when implementing a new information technology into an organization?

  How familiar are you with various computer technologies

How familiar are you with various computer technologies? What are your professional and personal goals? Where do you expect to be five years from now?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd