Examine general security concerns for cloud-based solutions

Assignment Help Management Information Sys
Reference no: EM131213051

Current Attack Vectors and Secure Network Design

A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems infrastructure across three (3) locations: one (1) primary headquarters and two (2) small satellite offices. All three (3) locations will occupy one (1) entire floor of a multitenant building. Your friend has asked your opinion regarding major technology choices that he must make for his business, such as operating systems, mobile devices, cloud services, and wireless networking.

Write a 6 page paper in which you:

Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.

Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.

Consider the use of cloud providers to allow for access to data for employees and potential clients. Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.

Recommend the minimum physical and technical controls for protecting the company's intellectual property from both internal and external threats. Provide a rationale for your response.

Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.

Design a floor plan of each of the three (3) offices. Include locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Use the graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, your name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Reference no: EM131213051

Questions Cloud

Describe the features of the case tool : Describe the features of the CASE tool and state the main features and benefits that developers would derive from the use of the particular CASE tool.
Calculate the radiation resistance and radiation pattern : This usually means an antenna between λ/50 to λ/10 in length. Given: In the short dipole, the current is linear: I(z') = I0(1 - (2/l)|z'|), where I = λ/20 is the total length of the dipole and 10 is constant.
Develop a relational schema based on the e-r diagram : Develop a relational schema based on the E-R diagram?. For this second assignment, you are to develop a relational schema based on the conceptual data model (ER diagram). Your relations should be normalized to the third Normal form
Labor and capital were sector-specific : How would your answer now change if, instead of being freely mobile, we assumed that both labor and capital were sector-specific? Comment on how the mobility or immobility of factors across industries affects the nature of political conflict we c..
Examine general security concerns for cloud-based solutions : Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.
What would you do if you were faced with the alternatives : What should he do? What non-quantitative factors might Hunter consider? What would you do if you were faced with these alternatives?
Make genogram to look it better : Make genogram to look it better.
Find an expression for the radiation resistance of antenna : Find an expression for the radiation resistance of the antenna
Explain complexities in a information technology environment : Explain the complexities in an information technology environment by applying best practices and using appropriate technologies and methodologies. Describe protocols for inter process communication for communication across networks.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the different organizational structures

Describe the different organizational structures as it relates to project management (i.e., functional, project-based, matrix). Discuss at least two (two) different roles that project managers can play in organizational leadership.

  Importance of business intelligence and report generation

What types of system-building methods and tolls did SourceGas use for building its system and describe the importance of business intelligence and report generation for SourceGas.

  End user input in database design

To what extent should end users be involved in the design of a database? How have our ideas of agile development environments affected this traditionally non-user input environment?

  Child care aware of america

Child Care Aware of America (2014). State by state resources for families. If you are unable to locate your state's information then complete an internet search by typing the name of your state name followed by the words "child care licensing

  Prepare an interim innovation corporate action plan

Provide a report that compares and contrast the different generic innovation cycles. Include a table that summarizes the attributes of these innovation cycles. Minimum length = 400 words.

  Write a technology roadmap

Write a technology roadmap based on how you see the technology would evolve in the market

  Technology industry and research methodsdiscuss the

technology industry and research methodsdiscuss the similarities and differences between basic and applied research and

  Describe the objectives of the database environment

Describe the objectives of the database environment. Describe the scope and boundaries. List the data specifications (must include a minimum of three entities with attributes).

  Analyze the privacy factors

Analyze the privacy factors raised as a result of this type of screening. Imagine that you are the CIO for a company of one hundred employees. Would you recommend the use of social media to screen employees? Why or why not

  Important information about costsconvenience stores create

important information about costsconvenience stores create software to lift profitability lead story-dateline wall

  Human resource information systems

Review the human resource information systems (HRIS) along with other HR web pages in the intranet section for Kudler Fine Foods in the Virtual Organizations

  What do you meant by knowledge management

What do you meant by knowledge management and If you were in charge of developing a knowledge management system in your company, what kinds of things would you take into account?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd