Analyze three specific potential malicious attacks

Assignment Help Computer Network Security
Reference no: EM131155283

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

1: Thoroughly analyzed three specific potential malicious attacks and / or threats that could be carried out against the network and organization.

2: Thoroughly explained in detail the potential impact of the three selected malicious attacks.

3: Thoroughly proposed the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

4: Thoroughly analyzed three potential concerns for data loss and data theft that may exist in the documented network.

5: Thoroughly explicated the potential impact of the three selected concerns for data loss and data theft.

6: Thoroughly proposed the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Microsoft Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows Server 2012 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

Reference no: EM131155283

Questions Cloud

Complete a recommendation form and an impact form : Complete a Recommendation Form and an Impact Form for at least one of the recommendations to explain your planning process to Adam and Kate.
Draft the risk analysis portion of your final project : Draft the risk analysis portion of your final project including Risk Identification, Quantification and Risk Response development. You should identify at least three potential risks
Relationship with a provider is a complicated issue : Ending a relationship with a provider is a complicated issue, especially on the part of the provider. There are many legal steps a provider must complete before terminating service with a patient. Case 2 on page 306 of your text gives such an exam..
Types of products or services of apple : Specify the nature, structure, and types of products or services of Apple, and identify two (2) key factors in the organization's external environment that can affect its success. Provide explanation to support the rationale.
Analyze three specific potential malicious attacks : Thoroughly analyzed three specific potential malicious attacks and / or threats that could be carried out against the network and organization.
Integral component of an induction program : Health and safety legislation should be an integral component of an induction program. Explain (100-120 words) how health and safety information could be incorporated into a Local Government induction.
Analyze primary features of american national government : The primary goal of your last assignment is to critically analyze the primary features of the American national government. The results of your analysis will indicate what you have learned over the last five weeks
Communicate information on health and safety legislation : Why is it necessary to regularly update and communicate information on health and safety legislation, codes, standards, policies and procedures relevant to self and other employees?
What is the publisher stated purpose for the test : The quality of a test is based on many factors. For example, we know a test must be valid and reliable. However, we must start by asking two key questions: 1) What information do I need to know? and 2) What is the publisher's stated purpose for th..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe at least three common vulnerabilities

Do these vulnerabilities disappear over time, or will they always remain once they have been introduced into an environment?

  Email viruses are typically launched by people

Email viruses are typically launched by people who modify header information to hide their identity. Brightmail's Enrique Salem says that in the future

  Organization managing public information on its web server

omment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. An organization managing public information on its Web serv..

  Explain how you came up with your encoding and decoding

Show your work here and explain how you came up with your encoding and decoding. If you want to reverse engineer an instruction the MARS assembler shows you the encoding of all assembled instructions.

  How to set up or improve their cyber security

How should government justify telling private industry how to set up or improve their cyber security

  Provide a report - an industry perspective of cyber security

Brief introduction to the topic, stating clearly the name and credentials of the presenter and brief overview of what the lecture was about and then setting out the interesting aspects that you are going to be covering in more detail  in your ..

  Difficulties in prosecutions of computer-related crimes

What piece of legislation allows computer records documenting criminal activity to be used in court - What is most often overlooked when planning for information security?

  Why is security primarily a management issue not a

why is security primarily a management issue not a technological issue? also provide some specific bulleted points on

  Present the project to the board of directors

Suppose the VoIP project sponsor wants you to present the project to the board of directors. Particularly, the sponsor would like you to discuss the quality of the project. It is worth noting that during the deployment of the VoIP system the quali..

  List three key things employees remember on data privacy

List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which draws someone to look at it while still maintaining professional appearan..

  What are penalties for committing these crimes

What might the profile (with emphasis on sociological and psychological theories) be for a cybercriminal who commits this type of cybercrime?

  Identify all potential security threats on personal computer

Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd