Reference no: EM13928727
Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:
1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows 2008 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system
The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and the potential impact it could have on the
organization.
Write a four to five (4-5) page paper in which you:
1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.
2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.
3. Analyze and assess all potential vulnerabilities that may exist in the documented network.
What is meant by the term identity theft
: In reference to a company sharing information that it has collected about a customer, what is meant by "opt-in"? By "opt-out"? In your opinion, which of these is preferable?
|
Series-parallel configurations
: If three of these computers are placed in parallel aboard the proposed space station, what is the system reliability for the first 6 months of operation?
|
Creating a context diagram
: Refer again to the information about the Reliable Pharmaceutical Service (RPS) at the end of Chapter 1, "The World of the Information Systems Analyst."
|
What net cash flow will the project produce in year ten
: The project will require an additional invest- ment in working capital of $250,000 in year 0 and $150,000 at the end of year 1. What net cash flow will this project produce in year 10?
|
Identifying potential malicious attacks
: You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:
|
Why preferred stock is referred to as preferred
: 250- to 350-word paper explaining why preferred stock is referred to as preferred and what some of the features added to preferred stock are that make it more attractive to investors. Would you select preferred stock or common stock as an investme..
|
What are the year one and year two net cash flows
: The marginal tax rate for Locus is 40 percent. What is the required net investment, and what are the year 1 and year 2 net cash flows?
|
What key concerns functional tactics address in marketing
: What are three types of opportunities for sharing that form a sound basis for diversification or vertical integration? Give an example of each from companies you have read about.
|
Relationship between test scores, school characteristics
: The purpose of this project is to analyze the relationship between test scores, school characteristics, and student demographic backgrounds for the California school districts. The data are based on all the 420 K-6 and K-8 districts in California ..
|