Discuss the dos security analysis

Assignment Help Accounting Basics
Reference no: EM13921699

As the network administrator for a medium-sized health clinic, you wear many hats in your role. The health clinic recently dismissed a nurse that had been with the clinic for over 10 years. Letting this nurse go is quickly becoming more complicated, since the nurse had access to many files, the computer system, and even building keys. Your supervisor fears that this nurse may retaliate against the clinic.

The staff members at the clinic use the Internet extensively to check patients' insurance and to authorize insurance claims. Shortly after dismissing this nurse, staff members throughout the clinic start to complain that the Internet has become so slow that it is unusable. The clinic uses a network appliance that functions as router, firewall, and wireless network access point. You have noticed that several rules on the firewall that would deny protocols, ports, or IP addresses have been disabled. You suspect that someone may have cracked the password to the firewall to accomplish this. Given that the firewall is remotely accessible, you suspect that the password was cracked without the perpetrator entering the building. The network intrusion detection system (NIDS) currently in place monitors network traffic by means of a sensor. Unfortunately, the NIDS had been slowing down network traffic prior to this most recent incident, so it had been disabled. The initial thought was that someone had re-enabled the NIDS, but that was not the case; it was disabled at the time of the incident.

After further investigation, you discover that the nurse's spouse is a very skilled computer programmer, and you also suspect that the nurse's spouse may have assisted the nurse in sabotaging the clinic's computers. You report your suspicions to your supervisor, who agrees with your conclusions.

You have been asked to evaluate the DoS and intrusion detection system (IDS) security analysis conducted after the recent DoS attack at the clinic. As part of that evaluation, you are to prepare a briefing for the staff at the clinic to help them understand the results of the security analysis, become more aware of the nature of DoS attacks and other network security attacks, and learn how they can help prevent attacks.

For this task you will be expected to follow the incident handling guidelines for DoS attacks as specified in Special Publication 800-61 from the National Institute of Standards and Technology (NIST) titled "Computer Security Incident Handling Guide." The section on incidents/attacks begins on Section 3 "Handling an Incident" (page 21). You can download this publication from the link listed in the web links section.

Task:

A.  Create a multimedia presentation (e.g., PowerPoint, Keynote) (suggested length of 12-15 slides) in which you do the following:

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

1. Discuss the DoS security analysis.

a. Explain how to evaluate a DoS/IDS security analysis in terms that nontechnical personnel would understand. Include the following.

  • Detection and analysis
  • Containment, eradication, and recovery
  • Post-incident recovery

2. Illustrate how all employees can help maintain network security when on the Internet and when using e-mail.

B. Create a memo (suggested length of 1-2 pages) to your supervisor justifying why the clinic should either update the current IDS or acquire and implement a new IDS.

1. Recommend a list of controls to address the security faults mentioned in this scenario.

C. If you use sources, include all in-text citations and references in APA format.

Reference no: EM13921699

Questions Cloud

Extra gui controls and functionality : In this HW are will be adding extra GUI controls and functionality to HW # 2. First, your calculator should be fully functional. This means that it should be able to accomplish all arithmetic operations on any set of numbers. The number buttons sh..
What is the companys target debt-equity ratio : Fama’s Llamas has a weighted average cost of capital of 10.4 percent. The company’s cost of equity is 13 percent, and its pretax cost of debt is 8.4 percent. The tax rate is 40 percent. What is the company’s target debt−equity ratio?
Role of deception and ethics in negotiation : Complete a 4- to 5 page research essay in Word format, citing at least three credible sources of information. Explained the role of deception and ethics in negotiation and cited two examples.
Using the free cash flow valuation model to price : Using the free cash flow valuation model to price an IPO Assume that you have an opportunity to buy the stock of CoolTech, Inc., an IPO being offered for $12.50 per share. Although you are very much interested in owning the company, Use the free cash..
Discuss the dos security analysis : As the network administrator for a medium-sized health clinic, you wear many hats in your role. The health clinic recently dismissed a nurse that had been with the clinic for over 10 years. Letting this nurse go is quickly becoming more complicate..
What is one strength you identified in each paragraph : What is one strength you identified in each paragraph? Why is it a strength? What is one aspect of each paragraph that needs improvement? How can it be improved
Describe the difference between training and development : Describe the difference between training and development. Explain the importance of developing employees. Analyse the methods by which Harrods ensures it recruits and retains its employees. Evaluate how training and development leads to career progre..
Find out the price that maximizes its profit : If the company is currently charging $4 a gallon, is it maximizing profit? If so, prove it. If not, find out the price that maximizes its profit, and compare the profits at the two prices.
Inventories of merchandising and manufacturing businesses : Of the three widely used inventory costing methods (FIFO, LIFO, and average), the FIFO method of costing inventory is based on the assumption that costs are charged against revenues in the order in which they were incurred.

Reviews

Write a Review

Accounting Basics Questions & Answers

  How much control does fed have over this longer real rate

Hubbard argues that the Fed can control the Fed funds rate, but the interest rate that is important for the economy is a longer-term real rate of interest.   How much control does the Fed have over this longer real rate?

  Coures:- fundamental accounting principles

Coures:- Fundamental Accounting Principles: - Explain the goals and uses of special journals.

  Accounting problems

Accounting problems,  Draw a detailed timeline incorporating the dividends, calculate    the exact Payback Period  b)   the discounted Payback Period. the IRR,  the NPV, the Profitability Index.

  Write a report on internal controls

Write a report on Internal Controls

  Prepare the bank reconciliation for company

Prepare the bank reconciliation for company.

  Cost-benefit analysis

Create a cost-benefit analysis to evaluate the project

  Theory of interest

Theory of Interest: NPV, IRR, Nominal and Real, Amortization, Sinking Fund, TWRR, DWRR

  Liquidity and profitability

Distinguish between liquidity and profitability.

  What is the expected risk premium on the portfolio

Your Corp, Inc. has a corporate tax rate of 35%. Please calculate their after tax cost of debt expressed as a percentage. Your Corp, Inc. has several outstanding bond issues all of which require semiannual interest payments.

  Simple interest and compound interest

Simple Interest, Compound interest, discount rate, force of interest, AV, PV

  Capm and venture capital

CAPM and Venture Capital

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd