Specific potential malicious attacks or threats

Assignment Help Basic Computer Science
Reference no: EM13956263

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

Write a four to five (4-5) page paper in which you:

  • Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.
  • Explain in detail the potential impact of the three (3) selected malicious attacks.
  • Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.
  • Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network.
  • Explicate the potential impact of the three (3) selected concerns for data loss and data theft.
  • Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.
  • Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • The specific course learning outcomes associated with this assignment are:
  • Explain the concepts of information systems security as applied to an IT infrastructure.
  • Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM13956263

Questions Cloud

Mitigating cloud computing risks : Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources onli..
Firm uses payback period criteria of not accepting project : AMP, Inc., has invested $2,165,800 on equipment. The firm uses payback period criteria of not accepting any project that takes more than four years to recover costs. The company anticipates cash flows of $445,386, $512,178, $564,255, $764,997, $816,5..
What is the present value of these acquired tax loss : In September, 2008, the IRS changed tax laws to allow banks to utilize the tax loss carry forwards of banks they acquire to shield their future income from taxes (prior law had restricted the ability of acquirers to use these credits). If Fargo Bank ..
Outline strategies to overcome these barriers : Outline Barriers to your Goals Strategies for reaching each of your Goals - Goals are easy to reach in the perfect world. In reality we face barriers to each goal we set for ourselves
Specific potential malicious attacks or threats : The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.
Are the events "being male" and "being a nursing major" : What is the probability of selecting an area code at random that ends with an odd number if the first digit can't be 1 or zero?
What is the value per share of common stock : It is January 2015. You work as a financial analyst for Merck & Co. and are tasked with the due diligence on the proposed acquisition of a biotech startup. You estimated the following cash flows for the startup: What is the terminal value, i.e., the ..
Arbitrage trading strategy and cash flows : 1. Suppose the (cash) spot price of a 10% coupon Treasury bond is $115 (per $100 par). The bond matures on February 15, 2021; it therefore pays coupons of $5 (per $100 par) every February 15 and August 15. Suppose today is January 15. Find the for..
New clubs will also require increase in net working capital : McGilla Golf has decided to sell a new line of golf clubs. The clubs will sell for $790 per set and have a variable cost of $390 per set. The company has spent $149,000 for a marketing study that determined the company will sell 53,000 sets per year ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain components of information systems

Using the three components of information systems and the complementary assets concepts, discuss why some companies achieve better results with information systems than others.

  Write a boolean function

Write a boolean function is_even(), which takes an integer as an argument and returns true if the argument is an even number, and false otherwise.

  Probability and set theory questions

COMP 2804 Assignment 3,  The Fibonacci numbers are defined as follows,  Assume we roll each of D1, D2, and D3 once, independently of each other. Let R 1 , R2, and R3 be the numbers on the top face of D1, D2, and D3, respectively.

  Compare b-mac, z-mac and s-mac for wireless sensor networks

Compare B-MAC, Z-MAC and S-MAC for wireless sensor networks.

  Create user-s requirements specification for easydrive

Create a user's requirements specification for the EasyDrive School of Motoring database system. Use a single major user view for the application (Director View).

  Describe how the deadlocks can be resolved

give at least two real life examples ( not related to a computer system invironment) of each of these concepts:deadlock, starvation, and race. describe how the deadlocks can be resolved.

  Suppose a product can be produced using virgin

Suppose a product can be produced using virgin ore at a marginal cost given by MC1 = 0.5q1 and with recycled materials at a marginal cost given by MC2 = 5 + 0.1q2.

  Evaluation process to seven-step acquisition model

Discuss in scholarly detail the acquisition evaluation process to the Seven-Step Acquisition Model.

  Complete the requirements using dbdl

Complete the requirements using DBDL and create Diagram. Make sure all tables are normalized to 3NF and exhibit proper relationships.

  Create an online questionnaire

Create an online questionnaire using your account on SurveyMonkey® or QuestionPro, Give your participants a few days to complete the online questionnaire.

  Design a program that will read a file of employee records

Design a program that will read a file of employee records containing employee number, employee name, hourly pay rate, and regular hours worked and overtime hours worked. The company pays its employees weekly, according to the following rules:Regular..

  Design a program that models the worm behavior

Design a program that models the worm behavior

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd