Develop a listing of vulnerabilities in current security

Assignment Help Computer Network Security
Reference no: EM132189659

Question: Perimeter Omega Research

Through analysis of reference materials regarding a notional organization, the student will develop the following products:

Written assessment of the current security posture of the organization. State in general terms where Omega has strengths and where they have weaknesses.

Develop a listing of threats (five), prioritized by their relative likelihood and potential frequency of occurrence. By definition, a threat is the occurrence of any event that causes an undesirable impact on the organization. Threats can be either man-made or natural. Is the disgruntled employee a threat? How likely is it that we Omega will be faced with an insider attempting to do bad things on their networks? Can you estimate how frequently that insider threat might manifest itself? What about the script kiddy? How likely is it that Omega will be probed by script kiddy? How frequently is this likely to occur?

Develop a listing of vulnerabilities (10) in the current security posture of Omega Research. A vulnerability is defined as the absence or weakness of a safeguard to reduce the risk associated with a specific threat.

Prioritize the vulnerabilities based on the potential impact on Omega Research if the vulnerability is exploited (threat is realized). (The FBI yearly report is helpful)

Considering the vulnerabilities associated with the current security posture of Omega, develop a single, optimal network security plan of action that reduces the vulnerabilities to an acceptable level (subjective). This plan will include:

Proposed changes to the perimeter architecture of all four sites. Include written description of recommended changes, why you are recommending these changes, and a logical network diagram of your solution for each site.

As necessary to compliment your perimeter design, proposed changes to the internal network/security architecture for each of the four sites. Include written description of recommended changes, why you are recommending these changes, and include those changes in your site diagrams.

As necessary to compliment your perimeter design, proposed changes to network/security management tools and/or procedures.

The 3 highest priority security policies that must be developed and published now to support your network security plan of action. Include the essence of these policies by using a customized template. Include a paragraph that summarizes the changes to the template.

Your recommendations on securely implementing the Omega Research web site and knowledge portal. Focused on location of networked resources within security zones within the enterprise and guidelines to prevent common web-based and SQL-based attacks.

Any additional recommendations you might have for Omega senior management to improve their bottom line.

Reference no: EM132189659

Questions Cloud

Explain how ingratiation helps a negotiator : Describe a few of the many reasons why an agenda can be an effective decision aid.
Define issues organization face with regards to protection : Search "scholar.google.com" or your textbook. Discuss the issues organization's face with regards to the protection of its customer information.
Function in c to find areas of triangles : How to write a function in C to find areas of triangles using Heron's formula for the triangles areas of ?ABC, ?ACD, ?ADE, and ?AEF.
How to create a culture of security in an organization : Topics such as how to create a culture of security in an organization, security concerns when migrating to the cloud, and how to write a business associate.
Develop a listing of vulnerabilities in current security : Develop a listing of vulnerabilities (10) in the current security posture of Omega Research. A vulnerability is defined as the absence or weakness.
Database system within the retail environment : Disaster management functions for the database system within the retail environment.
Discuss three lessons learned by taking this course : Discuss three conflict resolution strategies learned in the class. Discuss three lessons learned by taking this course.
Ieee single-precision real : 1. Convert the decimal value 7.5 to IEEE single-precision real.
Append a flowchart based on the algorithm : Append a flowchart based on the algorithm for the revised program needs. Add this to the revised program flowchart from the Week One Individual Assignment.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the various threats to information security

What are the various threats to information security

  Develop detailed plan to approach and secure incident scene

Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

  Network topology diagram and the domains of trust

Evaluate the extent to which programmers have the requisite experience to test the security of software within the development of a product

  Integrative network design project

Review the assignment instructions in the University of Phoenix Material: Integrative Network Design Project.

  Analyze three specific potential malicious attacks

Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.

  Decrypt the message baab using this cipher

You can think of this as a simple substitution cipher for hexadecimal digits. There is no "key" other than the table itself.

  What should network engineers expect to happen with security

Why is the current practice of securing the enterprise by hiding it behind hardened firewalls becoming extinct? What should network engineers expect to happen with security in 2 years?

  Define attack methodology and countermeasures

Attack Methodology and Countermeasures, Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings.

  Analyse and evaluate risks and security concerns

Analyse and evaluate risks and security concerns with cloud computing discuss strategies for addressing them

  Provide a basic network security plan

The new Exam Company, which will specialize in hosting online examinations, has just hired you to be the network administrator responsible for all network.

  Draw a diagram illustrating the network

COIT20262 - Advanced Network Security - Draw a message sequence diagram that illustrates the TLS/SSL packets belonging to the first HTTPS session in the file.

  Provide quantitative data to measure the threats

You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd