Specific potential malicious attacks or threats

Assignment Help Basic Computer Science
Reference no: EM13956263

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

Write a four to five (4-5) page paper in which you:

  • Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.
  • Explain in detail the potential impact of the three (3) selected malicious attacks.
  • Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.
  • Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network.
  • Explicate the potential impact of the three (3) selected concerns for data loss and data theft.
  • Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.
  • Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • The specific course learning outcomes associated with this assignment are:
  • Explain the concepts of information systems security as applied to an IT infrastructure.
  • Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM13956263

Questions Cloud

Mitigating cloud computing risks : Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources onli..
Firm uses payback period criteria of not accepting project : AMP, Inc., has invested $2,165,800 on equipment. The firm uses payback period criteria of not accepting any project that takes more than four years to recover costs. The company anticipates cash flows of $445,386, $512,178, $564,255, $764,997, $816,5..
What is the present value of these acquired tax loss : In September, 2008, the IRS changed tax laws to allow banks to utilize the tax loss carry forwards of banks they acquire to shield their future income from taxes (prior law had restricted the ability of acquirers to use these credits). If Fargo Bank ..
Outline strategies to overcome these barriers : Outline Barriers to your Goals Strategies for reaching each of your Goals - Goals are easy to reach in the perfect world. In reality we face barriers to each goal we set for ourselves
Specific potential malicious attacks or threats : The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.
Are the events "being male" and "being a nursing major" : What is the probability of selecting an area code at random that ends with an odd number if the first digit can't be 1 or zero?
What is the value per share of common stock : It is January 2015. You work as a financial analyst for Merck & Co. and are tasked with the due diligence on the proposed acquisition of a biotech startup. You estimated the following cash flows for the startup: What is the terminal value, i.e., the ..
Arbitrage trading strategy and cash flows : 1. Suppose the (cash) spot price of a 10% coupon Treasury bond is $115 (per $100 par). The bond matures on February 15, 2021; it therefore pays coupons of $5 (per $100 par) every February 15 and August 15. Suppose today is January 15. Find the for..
New clubs will also require increase in net working capital : McGilla Golf has decided to sell a new line of golf clubs. The clubs will sell for $790 per set and have a variable cost of $390 per set. The company has spent $149,000 for a marketing study that determined the company will sell 53,000 sets per year ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Sort the arraylist using the sort method associated

Sort the ArrayList using the sort method associated with the ArrayList and then display the sorted data in a second control. It should use visual basic langage.

  Personally identifiable information

1. Topic: Personally Identifiable Information (PII) 2. This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information tec..

  Describe what physical, logical and port addresses

With respect to TCP/IP; a) Describe what physical, logical and port addresses are and why they are required. b) Provide a real example of a physical, logical and port address - this should be from your own computer on your own network, or a lab co..

  Describe the general tree adt

Describe the General Tree ADT. Discuss different ways for implementing general trees, and compare them in terms of the efficiency of search operations.

  Identify the troublesome computer''s ip address and host

What commands would you use to identify the troublesome computer's ip address and host name?

  Find 1 article related to cloud-enabling technology

Find 1 article related to Cloud-Enabling Technology and to turn in the following: (1) TheURL of the article, (2) A brief summary of the article, and (3) a brief statement of your thoughts on the article. These items should be no more than 1 page in l..

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs, Flash RAM, and solid-state drives (SSD)

  Discuss the advantages of using procedures

Discuss the advantages of using procedures. Discuss how 80x86 procedures can be called from high-level programs or high-level procedures.

  Use free or open source

Use free or open source.

  Improving information systems

Explain how you would go about improving it. Who should be involved with you? What are some of the questions you should ask about the current process? How will you know if the process was actually improved?

  Create a gantt chart or project plan

Develop in accordance with the systems development life cycle and Create a Gantt chart or project plan (summary and detailed) template.

  Business continuity plans and disaster recovery

In recent years, organizations have witnessed the impact of having effective and non-effective business continuity plans and disaster recovery plans. In today's environment, with significant potential natural disasters, terrorist threats, and othe..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd