Reference no: EM13922423
The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.
Write a four to five (4-5) page paper in which you:
1. Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.
2. Explain in detail the potential impact of the three (3) selected malicious attacks.
3. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.
4. Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network.
5. Explicate the potential impact of the three (3) selected concerns for data loss and data theft.
6. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.
7. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.
Trial balance for the company
: The trial balance columns of the worksheet for Cajon Company at June 30, 2014
|
Ethical principles can address organizational issues
: Write a 750- to 1,050-word paper describing how ethical principles can address organizational issues. Include the organization you selected and discuss the following with regards to that organization and its industry:
|
Why are adjustments necessary for intercompany transfers
: Why are adjustments necessary for intercompany transfers? What are some ways the financials would be misstated if these intercompany transfers were not adjusted
|
Exchange for brick sold to sunset designs
: Writes off a $750 account receivable arising from a sale to Southwest Desert Accents that dates to 10 months ago.Phoenix receives a $1,000, 90-day, 10% note in exchange for brick sold to Sunset Designs. The brick cost $600.
|
Analyze three specific potential malicious attacks
: Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.
|
Focus on the various tools and techniques
: Paper: White-Collar Crime-For this assignment, we will focus on the various tools and techniques available to the security professional in order to mitigate white-collar crime.
|
Quotes from media conference that made it into media stories
: Do a desktop search to see if you can identify which quotes from the talent got used in the media then, post 100 words or more on the quotes from the media conference that made it into media stories. If you have room, or have something to reflect ..
|
Locate a competing organization in your local market
: Instructions: Locate a competing organization in your local market (or region) to help develop your SWOT analysis. You can find this information on the website for the U.S. Chamber of Commerce. Your SWOT analysis should address the Questions to As..
|
Facebook case study
: Analyze the information outlined below on the Facebook Case Study. Please perform additional research as what is provided here is just a synopsis.
|