Explain the potential impact of selected malicious attacks

Assignment Help Computer Network Security
Reference no: EM131149861

Assignment: Identifying Potential Malicious Attacks, Threats and Vulnerabilities

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

770_Network Diagram.jpg

1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Microsoft Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows Server 2012 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

Write a four to five page paper in which you:

1 Analyze three specific potential malicious attacks and / or threats that could be carried out against the network and organization.

2 Explain in detail the potential impact of the three selected malicious attacks.

3 Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

4 Analyze three potential concerns for data loss and data theft that may exist in the documented network.

5 Explicate the potential impact of the three selected concerns for data loss and data theft.

6 Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.

7 Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical styleconventions.

Reference no: EM131149861

Questions Cloud

Determine the stiffness of the column : Determine the stiffness of the column if the maximum deflection of the tank is to be limited to 0.5 m. The response spectrum of the shock load is shown in Fig. 9.48(c).
Analyze design process for defining a customized security : Analyze the design process for defining a customized security solution. Give your opinion as to which step in this design process is most significant.
List the major drivers of globalization : List the major drivers of globalization and provide three examples of each. Explain at least four effects of globalization that affect your community and your organization
Find the damping ratio of the system : When the base vibrates at a frequency of 10 Hz, the steady-state amplitude of the body is found to be 1.5 in. Find the magnitude of the force transmitted to the base.
Explain the potential impact of selected malicious attacks : Explain in detail the potential impact of the three selected malicious attacks. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.
Describe advantages and disadvantages of regional integr : Describe the advantages and disadvantages of regional integration and relate the stage of economic development of the economically integrated region to potential business opportunities
Derive an expression for the transmissibility : If the automobile travels at a velocity v, derive an expression for the transmissibility of the vertical motion of the automobile mass (m).
Determine the maximum acceleration experienced : A sensitive instrument of mass 100 kg is installed at a location that is subjected to harmonic motion with frequency 20 Hz and acceleration
Conduct a regional and product analyses for global venture : Select a product and a country for a global business venture. Conduct a regional, country, and product analyses for your new global venture

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are critical points in determining intention of sandra

Explain what MBT and Sandra could have done to protect against controversy arising - what can be determined about whether Sandra intended to make Janet a gift of $1,000,000? What are the critical points in determining intention of Sandra?..

  Discuss how standards for encryption modules

Go to the NIST FIPS 140-2 standards Website and read about the 140-2 encryption standards along with its annexes, discuss how standards for encryption modules and algorithms benefit the furtherance of Web application security

  Describe how an one­way hash function can prevent attack

Describe how Alice can cheat and describe how an one­way hash function can prevent this attack.

  Analyze the means in which data moves within organization

Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguard

  Characteristics of information security

Select one of the three characteristics of information security (CIA) and explain its importance as related to the development of policy, education, OR technology

  Describe the four types of network testing

Describe the four types of network testing typically performed. What is regression testing? Why is regression testing usually an important part of network testing

  Analyze the significance of hacking

Analyze the significance of hacking in organizations and modern society. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

  Identify different computer crimes that you are aware of

Computer crime has become a serious matter; for your Discussion Board post, consider the following: Identify 3 different computer crimes that you are aware of

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

  What is relationship between hashing and digital signatures

PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP.

  Evaluate an organization''s security policies

Evaluate an organization's security policies and risk management procedures, and its ability to provide security countermeasures. Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities.

  Strategies and recommendations to the cio

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization and draft a one page Executive Summary that details your strategies and recommendations to t..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd