Analyze three specific potential malicious attacks

Assignment Help Computer Network Security
Reference no: EM131380164

Assignment: Identifying Potential Malicious Attacks, Threats and Vulnerabilities

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls

5) 2 - Windows Server 2012 Active Directory Domain Controllers (DC)

2) 1 - Web / FTP server

6) 3 - File servers

3) 1 - Microsoft Exchange Email server

7) 1 - Wireless access point (WAP)

4) 1 - Network Intrusion Detection System (NIDS)

8) 100 - Desktop / Laptop computers

 

9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

Write a four to five page paper in which you:

1. Analyze three specific potential malicious attacks and / or threats that could be carried out against the network and organization.

2. Explain in detail the potential impact of the three selected malicious attacks.

3. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

4. Analyze three potential concerns for data loss and data theft that may exist in the documented network.

5. Explicate the potential impact of the three selected concerns for data loss and data theft.

6. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.

7. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131380164

Questions Cloud

Describe distribution and summarize the important feature : Describe the distribution and summarize the important features. What is it about running that might account for the shape you see?
Compose a thought provoking inquiry : Compose a thought provoking inquiry along with A analysis/reflection prepared, to engage in class discussion. Please use Sub heading title for the question and sub heading title for the analysis/reflection?
Has the accounting profession created a situation : Has the accounting profession created a situation in which the auditors' ethical behavior is impaired by their professional obligations?
Explain how the auditors legal liability might increase : A failure to meet these modified standards could increase a practitioner's exposure to legal liability. - Explain how the auditor's legal liability might increase as a result of changes to the audit report discussed.
Analyze three specific potential malicious attacks : Analyze three specific potential malicious attacks and / or threats that could be carried out against the network and organization. Explain in detail the potential impact of the three selected malicious attacks.
Competitive cell phone market has demand curve : Assume that a competitive cell phone market has a demand curve described by the equation. What are the consumer and producer surpluses in this market? What is the deadweight loss (DWL) if a price ceiling is set at Pmax = $19?
Why would such payments by utstarcom violate the fcpa : Do you believe it is ethically appropriate to allow such a defense when illegal payments are made? Why or why not?
What measures of center and spread are most appropriate : Without doing any calculations, which must be larger: the median or the mean? Explain how you know.
Advise anna as to her case for negligence against trevor : BUS503 PRINCIPLES OF COMMERCIAL LAW ASSESSMENT TASK. Trevor is the sole owner and operator of "Honey Bee Nature Appreciation Tours" (HB).  He operates walking tours of Bushland surrounding the Bunya Mountains. Advise Anna as to her case for Neglige..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe the fundamental challenges that organizations face

Determine the fundamental challenges that organizations face in general in regard to protecting organizational assets and information.

  How does defense in depth help prevent attacks?

How does defense in depth help prevent attacks?

  Explain the purpose of using cvss scores

Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)

  Prepare a trouble ticket to record the problem

Prepare a Trouble Ticket to record the problem

  Perform a wireless and remote connectivity assessment

Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal.

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  Sony reels from multiple hacker attacks

Sony Reels from Multiple Hacker Attacks on page 252 in the text and answer the questions below. APA formatting guidelines require a title page, abstract page, and reference page in addition to the body of the paper.

  Assignment on internet hacking

The topic is internet Hacking it should be at least 6 to 8 body pargraph, I just waana let you now that im not native english speaker so plese have easy vocabulary

  Explain some virtues and shortcomings of australian computer

Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics. Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.

  Personal information security through public wi-fi

Write paper on Personal information security through public Wi-Fi

  Developing a simple biometric authentication model

Developing an encryption/decryption demo (mainly for learning and teaching purposes)

  Cyberspace are not automatically secure

The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd