Exploited both network and host vulnerabilities

Assignment Help Basic Computer Science
Reference no: EM13714419

Answer edwin_1985 question on · Nov 06, 2014 at 12:07pm. Can you please help me with the similar project? I need a power point presentation. 

Prepare presentation slides on the security solution you would recommend. Show why your solution provides the best level of security. Assess the cost and the required resources of your solution.

================================

Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both network and host vulnerabilities.

The head of your company decides that security needs to be enhanced. The company network should be modified to prevent a majority of further attacks. Attacks that cannot be prevented should be at least detected. However, solutions for tolerating undetected attacks should also be envisioned. The head of the company charges you to come up with a plan. A rough estimate of the maximum cost of this task is: $500K for equipment and software and at least 1 full-time security administrator. However, the head of your company indicates that these numbers could change based on your proposal. Your goal is to propose the best plan that would provide the best level of security for adequate cost and resources.

The company already has a network of Linux computers for scientific research and a network of Windows computers for administrative tasks. Moreover, the company relies on its web server to advertise and sell some of its products. Both networks should be made more secure. Both networks should also be able to securely communicate.

Prepare presentation slides on the security solution you would recommend. Show why your solution provides the best level of security. Assess the cost and the required resources of your solution.

Reference no: EM13714419

Questions Cloud

Explain how the maxflow algorithm works : Explain how the maxflow algorithm works, elaborating on all cases and transitions that need to be considered during execution.
Identify the java-based technologies utilized : Five hundred words discussion paper. Identify the Java-based technologies utilized in this project and analyze each of them. Then, provide discussion on the purpose of each of the Java-based technologies utilized.
Mainframes are perceived as being more robust : QUESTION 1 Mainframes are perceived as being more robust than n-tier server architectures. True False
Compare and contrast physical access controls : Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.
Exploited both network and host vulnerabilities : Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both netwo..
The term means making an organization ready : QUESTION 1 The term means making an organization ready for possible contingencies that can escalate to become disasters.QUESTION 2 Mainframes are perceived as being more robust than n-tier server architectures.
Analysis summarizing the wireless design : Provide a 7 to 10 page analysis summarizing the wireless design to the executive management team. The summary should effectively allow the senior management to understand the organization security requirements and make the appropriate decisions..
Determine the activation energy in kj : Determine the activation energy in kJ/mol for a first order reaction if its specific rate constant 5.90e-05 s-1 at 400. K and 4.06e+02 s-1 at 600. K.
Tungsten with a mass numer of 185 and atomic number of 74 : Tungsten with a mass numer of 185 and atomic number of 74, decays by beta emissions. Identify the product of the nuclear reaction by its atomic symboll, mass number and atomic number?".'

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Writejava class take a seven-letter return the phone numbers

this week you are required to use concepts learned in this week: strings and the Java library method contains. Write a Java class PhoneNumber that will take in a seven-letter word and return the phone number that corresponds to it.

  How each room is identified by a room number

Each resident patient will stay in only one room. Every room must have had a patient, and every resident patient must have a room.

  Currently using common data exchange and data management

•Identify at least two (2) industries that are currently using common data exchange and data management trends. Rank the success of each implementation based on the ease of implementation, ease of use, and costs.

  Write an instruction sequence to set the contents of memory

write an instruction sequence to set the contents of memory locations at $1000, $1010, and $1020 to 10, 11, and 12 respectively

  Write a gui class game

Write a GUI class Game that implements a number guessing game.

  Create a gui application with jframe

Create a GUI application with JFrame that contains five labels describing reasons that a customer might not buy a specific product.

  What is the public interface of the counter class

what is the public interface of the counter class in section instance variables and encapsulation? How does it differ from the implementation of the class?

  Describe the graphical coordinate system in java

How do you specify a particular color to be used as fill when using the Graphics class?

  Research details of ad of current web site or magazine

Pick a current web site or magazine ad for a complete, working computer system, including computer, monitor, keyboard, and software, together with extra devices such as a mouse or printer

  Find the total power

Decompose s(t) into a linear combination of sinusoidal functions and find the amplitude, frequency, and phase of each component.

  What is a dtmc markov chain

What is a dtmc markov chain and write its application in information sciences?

  Write a program to sum the odd integers

Write a program that uses while statement to calculate average of several integers. Assuming the last value read is the sentinel 9999. For example, the sequence 10 8 11 7 9 9999 indicates that the program should calculate the average of all the va..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd