Identifying potential malicious attacks

Assignment Help Basic Computer Science
Reference no: EM13928727

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows 2008 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and the potential impact it could have on the
organization.

Write a four to five (4-5) page paper in which you:

1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.

2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.

3. Analyze and assess all potential vulnerabilities that may exist in the documented network.

Reference no: EM13928727

Leading the internal investigation of the accident

You are the chief systems engineer for Sir Richard Branson of Virgin Galactic Corporation, Ltd. As you are aware, last Friday, October 31st, there was a tragic and serious

Determine the value produced at the primary output

For each of the four possible combinations of inputs applied to the two primary inputs of this circuit, determine the value produced at the primary output. Is there a simple

Litigating divorce and insurance fraud cases

Should congress enact laws requiring ISP's to formally track their customers' activities in an attempt to aid police investigating crimes, attorneys litigating divorce and i

Length of the diameter of the circle

A circle in thexyxyx, y-plane has the equation (x+92)^2+(y+54)^2=73(x+92)2+(y+54)2=73left parenthes is, x, plus, 92, right parenthesis, start superscript, 2, end superscript

Rationale behind transformation of scale variable

Explain the rationale behind transformation of scale variable into Binary Variable with reference to relevant literatures. Explain the rationale behind transformation of cont

Summary of the information gathered

Prompt the user to enter the data needed to output a summary of the information gathered. Make sure to ask for the information in the format you would like it from the user

Create a world with an old-fashioned phonograph

Create a world with an old-fashioned phonograph (Objects) in it. Create methods to turn the crank and turn the record. Then, create the BDE control mechanism (Tips & Techniq

Physical security

As you've learned, physical security doesn't just mean securing systems. It also involves securing the premises, any boundaries, workstations, and other areas of a company. Wi

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd