Current attack vectors and secure network design

Assignment Help Basic Computer Science
Reference no: EM131291592

College (1-2 years: Freshman, Sophomore)Subject or discipline:IT, WebTitle:Writer's choiceNumber of sources:4Provide digital sources used:NoPaper format:APA# of pages:7Spacing:Double spaced# of words:1925# of slides:ppt icon 0# of charts:0Paper details:

Term Paper: Current Attack Vectors and Secure Network Design

A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems infrastructure across three (3) locations: one (1) primary headquarters and two (2) small satellite offices. All three (3) locations will occupy one (1) entire floor of a multitenant building. Your friend has asked your opinion regarding major technology choices that he must make for his business, such as operating systems, mobile devices, cloud services, and wireless networking.

Write a seven (7) page paper in which you:

1. Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.

2. Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause. 

3. Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.

4. Consider the use of cloud providers to allow for access to data for employees and potential clients. Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

5. Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.

6. Recommend the minimum physical and technical controls for protecting the company's intellectual property from both internal and external threats. Provide a rationale for your response.

7. Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.

8. Design a floor plan of each of the three (3) offices. Include locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Use the graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 

Note: Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Comments from Support Team:Discipline: Cyber Security

Reference no: EM131291592

Questions Cloud

What would be your response to the employee : As a manager, what would you do in this situation? What would be your response to the employee? Justify your answer.
Civilian and federal it infrastructure : With the current increase in security breaches affecting both the civilian and federal IT infrastructure, it is clear that there are no real IT solutions that can totally protect or provide a 100% defense against threats.
What was the spanish civil war fought about : What was the Spanish Civil War fought about? Which side won - At the end of the Spanish Civil War, how did Franco deal with the remaining resistance to his fascist regime?
System and database design on internet shopping sites : System and database design on Internet shopping sites. You can suggest a topic related with your work/interest or use one from the list below.
Current attack vectors and secure network design : A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential.
Explain how good and bad communication can affect morale : Explain why it is important for Medical Assistants to be aware and respectful of diversity in a healthcare setting.Explain how to incorporate diverse practice methods and ideas between coworkers while remaining respectful of their work practices and..
Develop a consumer behaviour report : Develop A Consumer Behaviour Report to be submitted to the Managing Director of a Medium to High Involvement Brand.
Write a bulleted overview of the budget process : Write a bulleted overview of the budget process For State of New York Please also include any relevant website links ( 1-3 links , no more than 3 links )that may be helpful in discussion in class.
Why both the individual and society should be concerned : Discuss why both the individual and society should be concerned about current and future implications of this issue. Address each of the suggestions for change. Your opinion is valued in this summary.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How your circuit achieves the desired behavior

Design a circuit that meets the specifications of Exercise 7.89 using edgetriggered D flip-flops (74x74) and NANO and NOR gates without feedback loops. Give a complete circuit diagram and a word description of how your circuit achieves the desired..

  Driving on a major highway

Were you ever puzzled by an odd looking tree while driving on a major highway? Perform a web search on "antennas camouflaged as trees" and explain in a few sentences what are they used for and why are they disguised.

  Packet-switched and circuit-switched

Packet-switched and circuit-switched are two standards utilized by wide area networks. In your Discussion Board posting of 4-6 paragraphs, address the following:

  Identify the elements of the business model

Identify the elements of the Business Model that cloud computing as a new opportunity could transform and describe the Business Concept, that outlines the vision of this future business model,

  Write a flow-chart and pseudo-code to solve the following

Write a flow-chart and pseudo-code to solve the following problem:

  Contemporary internal information system

You should complete the following tasks for the given business scenario. You are one of a team of newly graduated software engineers working on a project to build the infrastructure of an organization with an intensive and data sensitive internal ..

  Prepare a project plan that defines the tasks necessary

prepare a project plan that defines the tasks necessary to identify gaps related to privacy data and recommend mitigation actions for each gap. Students should include tasks, resources, cost estimates, and time estimates in the project plan.

  Perform a benchmark analysis

Write an algorithm to classify the edges of a directed graph G into the four categories: tree edge, back edge, forward edge and cross edge (defined in 22.3 Depth First Search - Classification of edges).

  Sort the array and write out the sorted array

Consider a program that will read employee information into an array of objects, sort the array by employee identification number, write out the sorted array, and compute various statistics on the data, such as the average age of an employee.

  Generate a recursive sequence

Given below is a small haskell function used to generate a recursive sequence. I'm getting a type error while using floor function. floor function is expecting RealFrac, I suppose. The code and error are given below.main = do

  Occurred risk likelihood and risk impact

Name of the threat description when and where it occurred risk likelihood and risk impactHow the threat attacks the system

  Frequency for types of clients and reasons for returning

Based on the scenario and data above, explain and analyze the relative frequency for types of clients and reasons for returning.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd