Develop a listing of vulnerabilities in current security

Assignment Help Computer Network Security
Reference no: EM132189659

Question: Perimeter Omega Research

Through analysis of reference materials regarding a notional organization, the student will develop the following products:

Written assessment of the current security posture of the organization. State in general terms where Omega has strengths and where they have weaknesses.

Develop a listing of threats (five), prioritized by their relative likelihood and potential frequency of occurrence. By definition, a threat is the occurrence of any event that causes an undesirable impact on the organization. Threats can be either man-made or natural. Is the disgruntled employee a threat? How likely is it that we Omega will be faced with an insider attempting to do bad things on their networks? Can you estimate how frequently that insider threat might manifest itself? What about the script kiddy? How likely is it that Omega will be probed by script kiddy? How frequently is this likely to occur?

Develop a listing of vulnerabilities (10) in the current security posture of Omega Research. A vulnerability is defined as the absence or weakness of a safeguard to reduce the risk associated with a specific threat.

Prioritize the vulnerabilities based on the potential impact on Omega Research if the vulnerability is exploited (threat is realized). (The FBI yearly report is helpful)

Considering the vulnerabilities associated with the current security posture of Omega, develop a single, optimal network security plan of action that reduces the vulnerabilities to an acceptable level (subjective). This plan will include:

Proposed changes to the perimeter architecture of all four sites. Include written description of recommended changes, why you are recommending these changes, and a logical network diagram of your solution for each site.

As necessary to compliment your perimeter design, proposed changes to the internal network/security architecture for each of the four sites. Include written description of recommended changes, why you are recommending these changes, and include those changes in your site diagrams.

As necessary to compliment your perimeter design, proposed changes to network/security management tools and/or procedures.

The 3 highest priority security policies that must be developed and published now to support your network security plan of action. Include the essence of these policies by using a customized template. Include a paragraph that summarizes the changes to the template.

Your recommendations on securely implementing the Omega Research web site and knowledge portal. Focused on location of networked resources within security zones within the enterprise and guidelines to prevent common web-based and SQL-based attacks.

Any additional recommendations you might have for Omega senior management to improve their bottom line.

Reference no: EM132189659

Questions Cloud

Explain how ingratiation helps a negotiator : Describe a few of the many reasons why an agenda can be an effective decision aid.
Define issues organization face with regards to protection : Search "scholar.google.com" or your textbook. Discuss the issues organization's face with regards to the protection of its customer information.
Function in c to find areas of triangles : How to write a function in C to find areas of triangles using Heron's formula for the triangles areas of ?ABC, ?ACD, ?ADE, and ?AEF.
How to create a culture of security in an organization : Topics such as how to create a culture of security in an organization, security concerns when migrating to the cloud, and how to write a business associate.
Develop a listing of vulnerabilities in current security : Develop a listing of vulnerabilities (10) in the current security posture of Omega Research. A vulnerability is defined as the absence or weakness.
Database system within the retail environment : Disaster management functions for the database system within the retail environment.
Discuss three lessons learned by taking this course : Discuss three conflict resolution strategies learned in the class. Discuss three lessons learned by taking this course.
Ieee single-precision real : 1. Convert the decimal value 7.5 to IEEE single-precision real.
Append a flowchart based on the algorithm : Append a flowchart based on the algorithm for the revised program needs. Add this to the revised program flowchart from the Week One Individual Assignment.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd