Identifying potential malicious attacks

Assignment Help Basic Computer Science
Reference no: EM13928727

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows 2008 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and the potential impact it could have on the
organization.

Write a four to five (4-5) page paper in which you:

1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.

2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.

3. Analyze and assess all potential vulnerabilities that may exist in the documented network.

Reference no: EM13928727

Questions Cloud

What is meant by the term identity theft : In reference to a company sharing information that it has collected about a customer, what is meant by "opt-in"? By "opt-out"? In your opinion, which of these is preferable?
Series-parallel configurations : If three of these computers are placed in parallel aboard the proposed space station, what is the system reliability for the first 6 months of operation?
Creating a context diagram : Refer again to the information about the Reliable Pharmaceutical Service (RPS) at the end of Chapter 1, "The World of the Information Systems Analyst."
What net cash flow will the project produce in year ten : The project will require an additional invest- ment in working capital of $250,000 in year 0 and $150,000 at the end of year 1. What net cash flow will this project produce in year 10?
Identifying potential malicious attacks : You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:
Why preferred stock is referred to as preferred : 250- to 350-word paper explaining why preferred stock is referred to as preferred and what some of the features added to preferred stock are that make it more attractive to investors. Would you select preferred stock or common stock as an investme..
What are the year one and year two net cash flows : The marginal tax rate for Locus is 40 percent. What is the required net investment, and what are the year 1 and year 2 net cash flows?
What key concerns functional tactics address in marketing : What are three types of opportunities for sharing that form a sound basis for diversification or vertical integration? Give an example of each from companies you have read about.
Relationship between test scores, school characteristics : The purpose of this project is to analyze the relationship between test scores, school characteristics, and student demographic backgrounds for the California school districts. The data are based on all the 420 K-6 and K-8 districts in California ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a mips program where we store 5 integers in the array

Write a mips program where we store 5 integers in the array. For example.

  Write a program to read in a postfix expression

Write a program to read in a postfix expression and output a corresponding infix expression. You may use any architecture and machinery developed and explained in class at length, as well as code from your solution to the last lab. Your output expres..

  Develop a computer forensics plan

Explain the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence.

  Servlet to return randomly chosen greeting

Write a servlet that returns a randomly chosen greeting from a list of five different greetings.

  Discuss beneficial impacts and negative effects of piracy

Summarize the information found in the articles in 4 full paragraphs. The blog entry should discuss the beneficial impacts and negative effects of the topic, it shouldn't be a review of the articles. The articles are used to find fact-based inform..

  Organizational of communication and risk

Introduction: project name, a brief description of the project, and deliverables of the project.

  Projects design and testing

Along with your program, you should also submit an Approach Document for this assignment. This is a short document (two to five pages long) explaining the project's design and testing.

  Finding project schedule if critical path is identified

Describe in scholarly detail how you find out a project schedule once critical path has been identified.

  The idea of this animation is to have the cuckoo clock keep

The idea of this animation is to have the cuckoo clock keep time

  Write a c++ program for encrypting and decrypting files

Write a C++ program for encrypting and decrypting files. Since this program performs two different functionalities (encryption and decryption), prompt the user to select the type of cryptographic technique as shown below.

  Under what circumstances will it fail

will the above function compile in C++? Is it correct? Under what circumstances will it fail and how should it be corrected?

  Store the quotient in a word-size variable called result

Show how to perform 77 / 3 in the HCS12. Store the quotient in a WORD-size variable called result, and the remainder in a WORD-size variable called remainder.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd