Information security engineer for a videogame development

Assignment Help Basic Computer Science
Reference no: EM131427420

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls

5) 2 - Windows Server 2012 Active Directory Domain Controllers (DC)

2) 1 - Web / FTP server

6) 3 - File servers

3) 1 - Microsoft Exchange Email server

7) 1 - Wireless access point (WAP)

4) 1 - Network Intrusion Detection System (NIDS)

8) 100 - Desktop / Laptop computers


9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization. 

1. Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.

2. Explain in detail the potential impact of the three (3) selected malicious attacks.

3. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

4. Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network.

5. Explicate the potential impact of the three (3) selected concerns for data loss and data theft.

6. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.

7. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM131427420

Questions Cloud

What is the effective interest rate of the note : On January 1, 2012, Wilmes Floral Supplies borrowed $2,413 from Bower Financial Services. Wilmes Floral Supplies gave Bower a $2,500 note with a maturity date of December 31, 2013. The note specified an annual stated interest rate of 8 percent.
What are the issues of individual and cultural diversity : What are the issues of individual and cultural diversity a counselor must consider when using REBT and behavioral theories?
Create a marketing plan for inclusion into business plan : Assess which tools should be the most effective for promoting their specific new business ventures. Create a digital marketing plan for inclusion into the business plan.
Current political climate in the us : Given the current political climate in the US, what limits - if any - do you think there should be re: freedom of speech? What do you think of "hate speech" laws? Does "intent" matter (for example - if someone did not intend to incite violence but..
Information security engineer for a videogame development : You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:
Diagnostic mental health categories : What types of populations and diagnostic mental health categories would be most inclined to use REBT and behavioral theories? Why?
Read about the ancient civilizations of china : We read about the ancient civilizations of China, India, and the Mediterranean. Each civilization developed a unique culture based on the themes otherwise known as the markers of civilization: economy, government, art, administration, religion, a..
Determine the use of available tool for integrated marketing : Demonstrate understanding of the use of a broad set of digital communication tools. Determine the use of available tools for integrated marketing on the internet.
Compute effective interest rate when the bonds were issued : What effective rate would an investor be earning by purchasing the bonds on December 31, 2012, at the market price and holding the bonds until maturity?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What form does time wait now take

What form does TIME WAIT now take? How would this be seen through the programming interface? Assume that a client socket could now be reconnected arbitrarily many times to a given server port, resources permitting

  Discuss how to build and dismantle a virtual private network

In what ways might your company, Andersen & Sons, or a company of your choosing, effectively use Web resources to improve its business?

  What will its complexity class (big-oh) be

Will this algorithm be faster than the standard selection sort? What will its complexity class (big-Oh) be?

  Determine the heat lost to the surroundings

The compressor requires a work input of 750 W and kinetic and potential energy changes are negligible. Determine the heat lost to the surroundings.

  Security by implementing database auditing

You are a DBA for corporation's databases. The management has decided to increase security by applying database auditing yet they are unspecific what actions to audit.

  Problem regarding the cryptographic methods

You have found an old ciphertext, where you know that the plaintext discusses cryptographic methods. You suspect that a Vigenere cipher has been used and therefore look for repeated strings in the ciphertext.

  Differentiating unix and window traceroute

Compare and contrast differences between Unix (or Linux) and Window Traceroute. All codes for each ICMP error message are not completely listed and explained.

  Examine the performance of your implementation

Examine the performance of your implementation as a function of k.

  Compare and contrast the categories

Identify two such Data Classification Models and then compare and contrast the categories they use for the various levels of classification.

  Holding ten elements of data

Begin this program by creating two arrays of integers, each holding ten elements of data. Create a third array of integers for a result array. Your main program will take the two arrays of integers and pass them to the function subtract(). Inside ..

  Company logo executive summary table of content

Group Portion Think of a business you would like to start. (I prefer Business name to be "World pre-owned Producers, Inc." Develop a business plan for your new business. The 4-6 page business plan must include the following: Company Logo Executive Su..

  Formulating and selecting dss implementation strategies

Discuss the considerations for formulating and selecting DSS implementation strategies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd