Identifying potential malicious attacks threats and

Assignment Help Computer Networking
Reference no: EM13372966

Identifying Potential Malicious Attacks, Threats and Vulnerabilities

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls

2) 1 - Web / FTP server

3) 1 - Microsoft Exchange Email server

4) 1 - Network Intrusion Detection System (NIDS)

5) 2 - Windows Server 2012 Active Directory Domain Controllers (DC)

6) 3 - File servers

7) 1 - Wireless access point (WAP)

8) 100 - Desktop / Laptop computers

9) VoIP telephone system

1240_Identifying Potential Malicious Attacks.png

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

Write a four to five (4-5) page paper in which you:

1. Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.

2. Explain in detail the potential impact of the three (3) selected malicious attacks.

3. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

4. Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network.

5. Explicate the potential impact of the three (3) selected concerns for data loss and data theft.

6. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.

Reference no: EM13372966

Questions Cloud

A closed organ pipe resonates with frequency 6hz and an : a closed organ pipe resonates with frequency 6hz and an open organ pipe resonates with frequency 12hz. if the two organ
Question 1 1a recent study by a major financial investment : question 1 1.a recent study by a major financial investment company was interested in determining whether the annual
Bratland j 2010 capital concepts as insights into the : bratland j. 2010 capital concepts as insights into the maintenance and neglect of infrastructure independent review 15
You must work alone to complete this quiz do not share : you must work alone to complete this quiz. do not share answers or ideas with other students. write your answers
Identifying potential malicious attacks threats and : identifying potential malicious attacks threats and vulnerabilitiesyou have just been hired as an information security
Case study bring your own device byodread the following : case study bring your own device byodread the following articles the dark side of byod from techrepublic and byod as we
Part-11 suppose the information content of a packet is the : part-11 suppose the information content of a packet is the bit pattern 1111 1011 1001 1100 and an even parity scheme is
Write a report on telehealth which addresses the : write a report on telehealth which addresses the followingbullintroductionbullbackgroundoverview - provide some
Case studysaint-foods limited ltd is a brittany-based snack : case studysaint-foods limited ltd is a brittany-based snack foods producer that is currently undergoing a major

Reviews

Write a Review

Computer Networking Questions & Answers

  Problems-mix statically and dynamically assigned addresses

Describe what types of problems could result from having a mix statically and dynamically assigned addresses on the same network.

  Cisco packet tracer

You can use Cisco Packet Tracer for this assignment (more information on use of Packet Tracer can be discussed with your Lecturer in Tutorial class).

  Determine internet address for domain name

Determine an Internet address for this domain name. Under what situations is each of the following statements true of the name resolution process?

  Make arrangement of subnet masks to form subnets

Organization owns network 200.1.1.0/24 and wants to form subnets for 4 departments. Write a possible arrangement of subnet masks to make this possible.

  1nbspnbspnbsp find the solution of the

1.nbspnbspnbsp find the solution of the systemxnbspnbspnbspnbspnbspnbspnbspnbspnbspnbspnbspnbspnbsp 1 mod

  Create a small network for an organization

You are to create a small network (less than 50 but greater than 20 nodes) for organization of choice consisting of multiple operating systems, security mechanisms, and devices.

  Explain why a pc is consider to be a fat client

Briefly discuss two benefits that the client/server architecture offers to the user.

  Explain why wbs has different levels

Explain why a WBS has different levels and what each level represents. Respond to the following: "If you were a project manager in charge of employees affected by the above situation.

  What is the maximum data capacity for traffic

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store?

  How would you ensure that critical update affecting security

How would you ensure that a critical update affecting security is delivered to all the clients using the application? Discuss what you would use for this delivery. Make sure to give advantages and disadvantages to this software.

  Explaining bus collision avoidance protocol

Some network designers used alternative bus collision avoidance protocol known as the token bus protocol.

  What protocol can use to move data

Can you run an ordinary TCP connection through the guard to pass it through the guard? Explain why/why not, and if not, what protocol can you use to move the data?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd