Examine the quick finance company network diagram and

Assignment Help Computer Network Security
Reference no: EM13478150

Above is the Quick Finance Company network diagram. The company is a small business and does not invest much in security protection. System 1000 hosts a customer database as well as employee payroll systems. The company Web server has been defaced twice this month and the VPN server has suffered from session hijacking and Denial-of-Service (DOS) attacks twice last year. The company does not enforce a password policy and does not have a dedicated security professional.

Write a five to eight (5-8) page paper in which you:

1. Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The company does not wish to release any security related information per company policy.

2. Analyze the above case and network diagram, and describe how each access point is protected or unprotected.

3. Evaluate and describe the vulnerabilities of the Quick Finance Company's network based on the network design.

4. Rank the top three (3) most likely network-based attacks in the order they are likely to occur and suggest countermeasures for each.

5. Recommend mitigation procedures to reduce or eliminate business interruptions.

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

Reference no: EM13478150

Questions Cloud

Homework help can you give me the price to complete these : can you give me the price to complete these two problems. thanks i3939ve attached the homework in an attached
Write the new technology developments in areas of generic : list the new technology developments in the areas of generic and networked computing and web-based systems. what are
Describe the probable effects that making system more : a waiter takes an order at a table and then enters it online via one of the six terminals located in the restaurant
Write some of the toughest management challenges in : what are some of the toughest management challenges in developing it solutions to solve business problems and meet new
Examine the quick finance company network diagram and : above is the quick finance company network diagram. the company is a small business and does not invest much in
How does use of internet intranets and extranets by : why do big companies still fail in their use of information technology? what should they be doing differently? discuss
Distinguish physical security from logical security and : question 1 imagine a local financial company just expanded its operations into five branches connected over a broadband
Eplain with example role of information system in modern : the success of mis function in any organization will depend upon the relative position of the chief of the mis function
Provide an example where a t-test would be useful in health : 1. you have the following data.groupc0000011111intelligencec10090110120130 8590958090run a t-test for this data.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Email viruses are typically launched by people

Email viruses are typically launched by people who modify header information to hide their identity. Brightmail's Enrique Salem says that in the future

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Computer forensics investigation

After a computer forensics investigation, you require to meet with your section or group of fellow investigators and critique the case in an effort to improve your work.

  How network security be customized for risks management

If not, how can one of these network security best practices be customized to requrements or risks present in the organization? How are risks to particular organization discovered or established?

  Describe how use of equipment software and multiplexing

write a 4-7 page paper including the followingmiddot analyze the current options available for use of tcpip and

  Classify this vulnerability using the risos model

The time-to-expire field is set at 0.5 because the administrator believes that this field unit is minutes (and wishes to set the time to 30 seconds) However, bind expects the field to be in seconds and reads the value as 0 - meaning that no data i..

  What are the benefits or privacy issues

What are cookies and how do they work? What are the benefits/ privacy issues? Short answer (1 -2 paragraphs).

  Geen computing is the study and practice of ecofriendly

1 green computing is the study and practice of ecofriendly computing resources. green computing is often seen

  You have been hired as the system administrator for msp llc

desktop migration proposalyou have been hired as system administrator for msp llc. your first task involves in

  A determine the elements of the risk management framework b

to foster and develop national preparedness and encourage the exploration of risk related interdependencies across the

  Identify the critical business functions

Identify the Critical Business Functions (CBFs) a midsized organization would need to restore after a catastrophic failure occurs, and suggest the ways the organization would determine the order in which it restores its CBFs.

  Evaluate software solutions to security problems

Security is a major concern for many mission-critical applications.  The focus of the assignment is specifically on protocols that contain known vulnerabilities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd