Create a memo for security controls and counter measures

Assignment Help Computer Network Security
Reference no: EM13767471

Scenario:

A small LLP consisting of a group of private investigators is headed by one of your friends. The partnership has a small office with one server and six workstations. Additionally, the partnership hosts its own website where it allows clients to log in and enter their case information. You suspect that the site may be lacking fundamental security and information safeguards.

During the past few weeks, staff members have noticed that the workstations are running sluggishly, and they routinely get advertisements on their computers when they are not on the Internet. Investigators routinely download and install programs and plug-ins from the Internet. However, the computers are not kept up-to-date with operating system patches or software patches for other installed software programs and plug-ins.

Lastly, there have been several complaints from clients that the company website has been unavailable or has timed out. Recently, the website was completely deleted and the homepage read, "You've been hacked." Fortunately, the website was able to be restored from a backup.

You have been asked by your friend to assist the group with its various security challenges by analyzing the threats the LLP faces.

Task:

A. Outline the top five threats to each of the following in the given scenario:
1. The server
2. The workstations
3. The website

B. Create a memo (suggested length of 2 pages) in which you do the following:
1. Evaluate the likelihood of the threats discussed in part A.
2. Recommend security controls and counter measures that should be instituted to mitigate these threats.

Reference no: EM13767471

Questions Cloud

Assignment on taxation research and communication : The current tax law system in the United States has emerged over many years from statutory, administrative, and judicial sources. These sources are continually changing and new laws are introduced at least annually.
What are some of the real world cautions : In addition, what are some of the real world cautions related to statistical inference and hypothesis testing that managerial practitioners need to be aware of?
Issues related to cholesterol : What options exist for a person to try and reduce his/her cholesterol without taking medication?
Write an introductory statement of the company : Write an introductory statement of the company including but not limited to the type of the company, the location, the industry in which it competes, and the organizational vision and mission that encompasses the nature of the company.
Create a memo for security controls and counter measures : Create a memo in which you do the following: Evaluate the likelihood of the threats discussed in part A. Recommend security controls and counter measures that should be instituted to mitigate these threats.
Taylor is applying for a position as a teller : Taylor is applying for a position as a teller at First Bank and Trust Company of Tinseltown. He submits a resume and attends an interview with the human resources department and, a few days later, gets a call from the human resources department telli..
Avoiding future frauds : Write a paper that describes the main aspects of the regulatory environment which will protect the public from fraud within corporations, Pay particular attention to SOX requirements. Assume your reader already knows SOX law - do not repeat it in..
Estimate the number of customers in the sample : Bob's, a fast-food chain specializing in hot dogs and garlic fries, keeps track of the proportion of its customers who decide to eat in the restaurant (as opposed to ordering the food "to go") so it can make decisions regarding the possible construct..
A manager of a shoe manufacturing plant : 1. Assume that a manager of a shoe manufacturing plant wants to practice management by exception. What are some types of reports that would be helpful? 2. Of the six systems elements that you can form the basis for system control design, which one do..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Etherpad shared document editing system

Etherpad shared document editing system and community version of the Alfresco Enterprise Content Management System

  Securing several desktop computers connected to network

Securing numerous desktop computers connected to the network. Explain the access control that you would put in place for each and explain why.

  Subnet masking and designing small networks

Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  Improve security on its network

You were hired as a security consultant for a medium-sized organization. You and your team need to help the organization to improve security on its network

  Identification of preventative controls

Identification of preventative controls and the development of recovery strategies and Explanation of the information technology (IT) contingency planning process to include an understanding of the required business impact analysis

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  How adequate destruction of materials ensuring privacy

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  What is cyber security and what are some of its key concept

What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats

  At what generation did video downloads and reasonably fast

answer the following test your understanding questions from chapter 8 using apa style and form nbspnbsp a. what are

  What is the significance of nevis island

What is the significance of Nevis Island and what is the significance of Stella's message to Fiona asking for interest rates?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd