Assess any potential malicious attacks and threats

Assignment Help Computer Network Security
Reference no: EM13926730

You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows 2008 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and the potential impact it could have on the
organization.

Write a four to five (4-5) page paper in which you:

1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.
2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.
3. Analyze and assess all potential vulnerabilities that may exist in the documented network.

Reference no: EM13926730

Questions Cloud

Describe one specific example where you exercised leadership : Describe one specific example where you exercised leadership. The essay should examine your personal characteristics that constitute your potential for leadership including: the ability to anticipate upcoming trends
Calculate the effective interest rate on the loan : A $1 million loan requires five end-of-year equal payments of $284,333. Calculate the effective interest rate on this loan. How much interest (in dollars) is paid over the life of this loan?
Convert the entity relationship diagram into tables : Convert the ER Diagram below to a list of tables. Be sure to identify primary keys and foreign keys.
Applications of epidemiology-case study : Escherichia coli (E. coli) is a bacteria usually found in warm blooded organisms such as human and animal intestines. Although there are large groups of E.coli, most strains are harmless.
Assess any potential malicious attacks and threats : Analyze and assess any potential malicious attacks and threats that may be carried out against the network.
What is the calculated chi-square statistic : What is the calculated chi-square statistic and What are the degrees of freedom - Write a short description of your results, including the level of statistical and substantive significance, the direction of the association, and whether any low expe..
Identify risks inherent in the use of wireless : Write a two to three (2-3) page paper in which you: 1. Identify risks inherent in the use of wireless and mobile technologies.
Calculate the least squares estimate : Calculate the least squares estimate of  and What's the first row, second column entry of ? (Round to the nearest fourth decimal)
Performance appraisals can increase employee performance : Write a paper describing how effective performance appraisals can increase employee performance. This paper should include sections on the strategic advantages of performance appraisals, potential forms of bias within the appraisal system,

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss the type of encryption

Identify the key reasons for selecting your wireless home router. Discuss the type of encryption it uses and explain the reason(s) why you believe this method of encryption is more superior than its contemporaries.

  Selection of a dynamic routing protocol

Selection of a dynamic routing protocol, explanation of how that protocol will be implemented, and justification for the selection/design - Logical network design, explanation, and justification for how the proposed design addresses the requirement..

  Identify and prioritize it security controls

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization

  What is data mining and why is it considered controversial

What exactly is "cyber ethics" How is it different from and similar to computer ethics information ethics and Internet ethics and Identify and describe some key aspects of each of the four phases in the evolution of cyber ethics as a field of app..

  Development for critical infrastructure protection

Identify the state actors and non-state actors that pose the greatest cyber threat to the United States and justify your selections - describe how the mix of state and non-state actors you identified should affect policy maker decision-making and..

  Monitoring of a secure network design in an organization

Analyze strategies for maintenance and monitoring of a secure network design in an organization. Create recommendations for maintenance and monitoring tools to support maintenance of a secure network within an organization

  Common information security threats

This is part one of a three-part assignment. The final version will be submitted. It is expected that adjustments will be made in the final version based on the feedback provided .

  Explaining secure protocol

Assume that Alice shares a secret s with her company's server computer. When Alice is on a trip, she tries to store an important message in the CEO's account directory.

  Choose two firms which offer computer security outsourcing

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  What is the difference between authentication and

part 1 review questions what is the difference between authentication and authorization? can a system permit

  How to cracking passwords without salt

Cracking Passwords with Salt on Linux.  Recently, an associate of yours got access to an Ubuntu Linux server. You  suspect users of this system (UST students) have a strong tendency to use the same passwords for everything (including their online..

  Explain access control methods and attacks

Explain access control methods and attacks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd