Create a memo for security controls and counter measures

Assignment Help Computer Network Security
Reference no: EM13767471

Scenario:

A small LLP consisting of a group of private investigators is headed by one of your friends. The partnership has a small office with one server and six workstations. Additionally, the partnership hosts its own website where it allows clients to log in and enter their case information. You suspect that the site may be lacking fundamental security and information safeguards.

During the past few weeks, staff members have noticed that the workstations are running sluggishly, and they routinely get advertisements on their computers when they are not on the Internet. Investigators routinely download and install programs and plug-ins from the Internet. However, the computers are not kept up-to-date with operating system patches or software patches for other installed software programs and plug-ins.

Lastly, there have been several complaints from clients that the company website has been unavailable or has timed out. Recently, the website was completely deleted and the homepage read, "You've been hacked." Fortunately, the website was able to be restored from a backup.

You have been asked by your friend to assist the group with its various security challenges by analyzing the threats the LLP faces.

Task:

A. Outline the top five threats to each of the following in the given scenario:
1. The server
2. The workstations
3. The website

B. Create a memo (suggested length of 2 pages) in which you do the following:
1. Evaluate the likelihood of the threats discussed in part A.
2. Recommend security controls and counter measures that should be instituted to mitigate these threats.

Reference no: EM13767471

Questions Cloud

Assignment on taxation research and communication : The current tax law system in the United States has emerged over many years from statutory, administrative, and judicial sources. These sources are continually changing and new laws are introduced at least annually.
What are some of the real world cautions : In addition, what are some of the real world cautions related to statistical inference and hypothesis testing that managerial practitioners need to be aware of?
Issues related to cholesterol : What options exist for a person to try and reduce his/her cholesterol without taking medication?
Write an introductory statement of the company : Write an introductory statement of the company including but not limited to the type of the company, the location, the industry in which it competes, and the organizational vision and mission that encompasses the nature of the company.
Create a memo for security controls and counter measures : Create a memo in which you do the following: Evaluate the likelihood of the threats discussed in part A. Recommend security controls and counter measures that should be instituted to mitigate these threats.
Taylor is applying for a position as a teller : Taylor is applying for a position as a teller at First Bank and Trust Company of Tinseltown. He submits a resume and attends an interview with the human resources department and, a few days later, gets a call from the human resources department telli..
Avoiding future frauds : Write a paper that describes the main aspects of the regulatory environment which will protect the public from fraud within corporations, Pay particular attention to SOX requirements. Assume your reader already knows SOX law - do not repeat it in..
Estimate the number of customers in the sample : Bob's, a fast-food chain specializing in hot dogs and garlic fries, keeps track of the proportion of its customers who decide to eat in the restaurant (as opposed to ordering the food "to go") so it can make decisions regarding the possible construct..
A manager of a shoe manufacturing plant : 1. Assume that a manager of a shoe manufacturing plant wants to practice management by exception. What are some types of reports that would be helpful? 2. Of the six systems elements that you can form the basis for system control design, which one do..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Creating a presentation regarding system security

Your quality improvement circle has been assigned the task of creating a presentation regarding system security as it applies to the ability of the general public access to a combined personal and the electronic medical record housed by the hospit..

  Difference between a security policy and a security plan

Discuss the difference between a security policy and a security plan

  Encryption requirements as stated in the law

Identify ONE law, either a US Federal Law or a US state law, that requires the use of encryption to protect either consumer or corporate information from unauthorized disclosure. Write a 150+ word plain English summary in which you address the fol..

  Choose a recent technical article from a referred journal

please choose a recent technical article from a referred journal or conference proceedings on the topic of threats and

  A determine the elements of the risk management framework b

to foster and develop national preparedness and encourage the exploration of risk related interdependencies across the

  Research paper on the privacy and on financial services

You need to work on the privacy and on financial services. For example Mint, Its an app also online access to keep track of your financial use in a month.

  Investigating case in employee allegedly sending photos

You are investigating a case involving an employee who is allegedly sending inappropriate photos via e-mail in attachments that have been compressed with a zip utility.

  Design and implementation of a security approach

use Microsoft Powerpoint to create your slides for a 15-minute presentation. It`s about Computer Hacking the same subject that you wrote in the report. You are going to take the same information that you wrote in the report and make it as slides.

  Discuss a minimum of five event types found in a dhcp log

Discuss a minimum of five event types found in a DHCP log and describe what they refer to and what plan will you follow to assign printers to all the users in the organization?

  Determine primary security risk that users must acknowledge

Based on the article by Lenning (2005), determine a primary security risk that users must acknowledge when using macros? Why is it significant to educate users of these risks once their dilemma is resolved?

  Security awareness on the internet

Search for security awareness on the internet. Describe the available materials. Choose one of the web sites that might work for security awareness program at your school

  Identify the anomaly in the traffic organisation going

Identify the anomaly in the traffic this organisation is going through. What sort of evidence do you have to make this claim. What sort of utility or tool do you think the "attacker"is using to conduct this attack

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd