Reference no: EM132319837
Assignment: Logical attacks abuse the functionality of a program. Logical attacks can be accomplished through denial of service, queue jumping, distributed denial of service attacks, and IP spoofing. Combating logical attacks requires a new set of prevention and detection techniques.
Imagine that you are the chief information security officer (CISO) for an organization (it may help to select a specific organization with which you are familiar). You have been asked to develop a presentation for upper-level management on the key techniques to mitigate logical attacks against computers and computer networks.
For this task, you will develop a PowerPoint presentation on how the following topics can help mitigate logical attacks:
1. Establish and maintain an information security management system (ISMS)
2. Monitor and review the ISMS
3. Testing of solutions
4. Monitor IT infrastructure
5. Develop and implement a business continuity response
6. Protect against malware
7. Manage network and connectivity security
8. Monitor the infrastructure for security-related events
9. Effect of the influence of the organizational structures enabler (information security manager, heads of IT operations, service manager, chief security architect)
Incorporate appropriate animations, transitions, and graphics as well as speaker notes for each slide. The speaker notes may be comprised of brief paragraphs or bulleted lists.
Support your presentation with at least 12 scholarly resources. In addition to these specified resources, other appropriate scholarly resources may be included.
Keep your audience in mind. Remember you are not preparing this for an academic audience. Your audience will not care about theoretical or conceptual issues in risk management. They will only care about specific issues, strategies, and scenarios that are relevant to their organization.
Length: 12-15 slides (with a separate reference slide)
Notes Length: 200-350 words for each slide
Describe target customer value proposition
: Describe Target's customer value proposition, profit formula, key resources, and key processes.
|
What are common techniques used to protect a password file
: What are two common techniques used to protect a password file? What are three benefits that can be provided by an intrusion detection system?
|
Pre-trip planning before you visit field site
: Pre-Trip Planning Before you visit a field site, do background research about where you'll visit so once you're at the location,
|
What are some weaknesses of a packet filtering firewall
: What are some weaknesses of a packet filtering firewall? What is the difference between a packet filtering firewall and a stateful inspection firewall?
|
Develop a presentation for upper-level management
: Imagine that you are the chief information security officer (CISO) for an organization (it may help to select a specific organization with which.
|
Evaluate the current ethical and legal concerns
: Evaluate the current ethical and legal concerns surrounding your topic. Select one ethical or legal concern surrounding your topic, take a position on the issue
|
Patient in a busy emergency department
: You are a patient in a busy emergency department. You present with an asthma attack, which is a chronic condition for you, and is exacerbated by pollen season.
|
Describe the commercial appliance firewall
: Firewall options for the individual or for those running a small office range from native OS firewalls to special-purpose devices. Most individuals and small.
|
Design and develop smart application to execute all tasks
: COIS13034 - Cloud Based Smart Applications Management Assignment, CQ University, Australia. Design and develop smart application to execute all required tasks
|