Identifying potential malicious attacks

Assignment Help Basic Computer Science
Reference no: EM13928727

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows 2008 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and the potential impact it could have on the
organization.

Write a four to five (4-5) page paper in which you:

1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.

2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.

3. Analyze and assess all potential vulnerabilities that may exist in the documented network.

Reference no: EM13928727

Questions Cloud

What is meant by the term identity theft : In reference to a company sharing information that it has collected about a customer, what is meant by "opt-in"? By "opt-out"? In your opinion, which of these is preferable?
Series-parallel configurations : If three of these computers are placed in parallel aboard the proposed space station, what is the system reliability for the first 6 months of operation?
Creating a context diagram : Refer again to the information about the Reliable Pharmaceutical Service (RPS) at the end of Chapter 1, "The World of the Information Systems Analyst."
What net cash flow will the project produce in year ten : The project will require an additional invest- ment in working capital of $250,000 in year 0 and $150,000 at the end of year 1. What net cash flow will this project produce in year 10?
Identifying potential malicious attacks : You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:
Why preferred stock is referred to as preferred : 250- to 350-word paper explaining why preferred stock is referred to as preferred and what some of the features added to preferred stock are that make it more attractive to investors. Would you select preferred stock or common stock as an investme..
What are the year one and year two net cash flows : The marginal tax rate for Locus is 40 percent. What is the required net investment, and what are the year 1 and year 2 net cash flows?
What key concerns functional tactics address in marketing : What are three types of opportunities for sharing that form a sound basis for diversification or vertical integration? Give an example of each from companies you have read about.
Relationship between test scores, school characteristics : The purpose of this project is to analyze the relationship between test scores, school characteristics, and student demographic backgrounds for the California school districts. The data are based on all the 420 K-6 and K-8 districts in California ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd