Create a memo for security controls and counter measures

Assignment Help Computer Network Security
Reference no: EM13767471

Scenario:

A small LLP consisting of a group of private investigators is headed by one of your friends. The partnership has a small office with one server and six workstations. Additionally, the partnership hosts its own website where it allows clients to log in and enter their case information. You suspect that the site may be lacking fundamental security and information safeguards.

During the past few weeks, staff members have noticed that the workstations are running sluggishly, and they routinely get advertisements on their computers when they are not on the Internet. Investigators routinely download and install programs and plug-ins from the Internet. However, the computers are not kept up-to-date with operating system patches or software patches for other installed software programs and plug-ins.

Lastly, there have been several complaints from clients that the company website has been unavailable or has timed out. Recently, the website was completely deleted and the homepage read, "You've been hacked." Fortunately, the website was able to be restored from a backup.

You have been asked by your friend to assist the group with its various security challenges by analyzing the threats the LLP faces.

Task:

A. Outline the top five threats to each of the following in the given scenario:
1. The server
2. The workstations
3. The website

B. Create a memo (suggested length of 2 pages) in which you do the following:
1. Evaluate the likelihood of the threats discussed in part A.
2. Recommend security controls and counter measures that should be instituted to mitigate these threats.

Reference no: EM13767471

Questions Cloud

Assignment on taxation research and communication : The current tax law system in the United States has emerged over many years from statutory, administrative, and judicial sources. These sources are continually changing and new laws are introduced at least annually.
What are some of the real world cautions : In addition, what are some of the real world cautions related to statistical inference and hypothesis testing that managerial practitioners need to be aware of?
Issues related to cholesterol : What options exist for a person to try and reduce his/her cholesterol without taking medication?
Write an introductory statement of the company : Write an introductory statement of the company including but not limited to the type of the company, the location, the industry in which it competes, and the organizational vision and mission that encompasses the nature of the company.
Create a memo for security controls and counter measures : Create a memo in which you do the following: Evaluate the likelihood of the threats discussed in part A. Recommend security controls and counter measures that should be instituted to mitigate these threats.
Taylor is applying for a position as a teller : Taylor is applying for a position as a teller at First Bank and Trust Company of Tinseltown. He submits a resume and attends an interview with the human resources department and, a few days later, gets a call from the human resources department telli..
Avoiding future frauds : Write a paper that describes the main aspects of the regulatory environment which will protect the public from fraud within corporations, Pay particular attention to SOX requirements. Assume your reader already knows SOX law - do not repeat it in..
Estimate the number of customers in the sample : Bob's, a fast-food chain specializing in hot dogs and garlic fries, keeps track of the proportion of its customers who decide to eat in the restaurant (as opposed to ordering the food "to go") so it can make decisions regarding the possible construct..
A manager of a shoe manufacturing plant : 1. Assume that a manager of a shoe manufacturing plant wants to practice management by exception. What are some types of reports that would be helpful? 2. Of the six systems elements that you can form the basis for system control design, which one do..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd