Exploited both network and host vulnerabilities

Assignment Help Basic Computer Science
Reference no: EM13714419

Answer edwin_1985 question on · Nov 06, 2014 at 12:07pm. Can you please help me with the similar project? I need a power point presentation. 

Prepare presentation slides on the security solution you would recommend. Show why your solution provides the best level of security. Assess the cost and the required resources of your solution.

================================

Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both network and host vulnerabilities.

The head of your company decides that security needs to be enhanced. The company network should be modified to prevent a majority of further attacks. Attacks that cannot be prevented should be at least detected. However, solutions for tolerating undetected attacks should also be envisioned. The head of the company charges you to come up with a plan. A rough estimate of the maximum cost of this task is: $500K for equipment and software and at least 1 full-time security administrator. However, the head of your company indicates that these numbers could change based on your proposal. Your goal is to propose the best plan that would provide the best level of security for adequate cost and resources.

The company already has a network of Linux computers for scientific research and a network of Windows computers for administrative tasks. Moreover, the company relies on its web server to advertise and sell some of its products. Both networks should be made more secure. Both networks should also be able to securely communicate.

Prepare presentation slides on the security solution you would recommend. Show why your solution provides the best level of security. Assess the cost and the required resources of your solution.

Reference no: EM13714419

Questions Cloud

Explain how the maxflow algorithm works : Explain how the maxflow algorithm works, elaborating on all cases and transitions that need to be considered during execution.
Identify the java-based technologies utilized : Five hundred words discussion paper. Identify the Java-based technologies utilized in this project and analyze each of them. Then, provide discussion on the purpose of each of the Java-based technologies utilized.
Mainframes are perceived as being more robust : QUESTION 1 Mainframes are perceived as being more robust than n-tier server architectures. True False
Compare and contrast physical access controls : Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.
Exploited both network and host vulnerabilities : Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both netwo..
The term means making an organization ready : QUESTION 1 The term means making an organization ready for possible contingencies that can escalate to become disasters.QUESTION 2 Mainframes are perceived as being more robust than n-tier server architectures.
Analysis summarizing the wireless design : Provide a 7 to 10 page analysis summarizing the wireless design to the executive management team. The summary should effectively allow the senior management to understand the organization security requirements and make the appropriate decisions..
Determine the activation energy in kj : Determine the activation energy in kJ/mol for a first order reaction if its specific rate constant 5.90e-05 s-1 at 400. K and 4.06e+02 s-1 at 600. K.
Tungsten with a mass numer of 185 and atomic number of 74 : Tungsten with a mass numer of 185 and atomic number of 74, decays by beta emissions. Identify the product of the nuclear reaction by its atomic symboll, mass number and atomic number?".'

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the instruction format

What are the instruction format and the equivalent assembly instruction of 0x21080040(with steps)?

  Sbru moved away from having campus reps with posted

Spring Breaks ''R'' Us (SBRU) is an online travel service that books spring break trips to resorts for college students. The head office comprises 6 members of staff, all of whom are involved in the booking process; the manager and assistant manager ..

  How do you create an applet with a button labeled

How do you create an applet with a button labeled "Who's the greatest?" When the user clicks the button, display your name in large font.

  Write a multithreaded program

This program will be passed a series of numbers on the command line and will then create three separate worker threads. One thread will determine the average of the numbers, the second will determine the maximum value, and the third will determine..

  Part of a surgical admitting process

Part of a surgical admitting process orderlies are available to escort patients to the pre-surgery preparation area. Patients are not allowed to go by themselves as a matter of policy.

  Computer architecture is the combination of software and

computer architecture is the combination of software and hardware that is organized in such a fashion as to deliver the

  These function prototypes lack parameters

These function prototypes lack parameters; add whatever parameters you feel are necessary so that the program works without global variables. The program's output should reflect the bus's actions by reporting each change in state, along with the n..

  Investigation-woman having inappropriate files on computer

Young woman who was fired from her job for inappropriate files discovered on computer, and she swears she never accessed files. What questions must you ask and how should you proceed?

  Implementing the methods correctly

Implementing the methods correctly.

  Program that reads a file of computer data names computers

write a program that reads a file of computer data names computers.txt. creates an array of Computer objects.

  What other major discoveries in cosmology have relied

Some advances in our knowledge have been made possible through better equipment, such as Hubble's discoveries using the 100-inch Hooker telescope at Mount Wilson. What other major discoveries in cosmology have relied on improvements in existing ap..

  Similarity and differences between the code of c++ and java

The following is simple java program with a for loop and a simple function What is its equivalent in C++ code? Notice the similarity and differences between the code provided below to C++. Create a project and run the program and see how it runs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd