Explain in detail the potential impact of malicious attacks

Assignment Help Management Information Sys
Reference no: EM131358207

Assignment: Identifying Potential Malicious Attacks, Threats and Vulnerabilities

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls

5) 2 - Windows Server 2012 Active Directory Domain Controllers (DC)

2) 1 - Web / FTP server

6) 3 - File servers

3) 1 - Microsoft Exchange Email server

7) 1 - Wireless access point (WAP)

4) 1 - Network Intrusion Detection System (NIDS)

8) 100 - Desktop / Laptop computers

 

9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.

Write a four to five page paper in which you:

1. Analyze three specific potential malicious attacks and / or threats that could be carried out against the network and organization.

2. Explain in detail the potential impact of the three selected malicious attacks.

3. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

4. Analyze three potential concerns for data loss and data theft that may exist in the documented network.

5. Explicate the potential impact of the three selected concerns for data loss and data theft.

6. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.

7. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note:

Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131358207

Questions Cloud

Worth of inventory-dollars of contribution margin : Chester Corp. ended the year carrying $13,104,000 worth of inventory. Had they sold their entire inventory at their current prices, how many more dollars of contribution margin would it have brought to Chester Corp.?
Discuss the need for a cso are you for or against : Discuss the need for a CSO, are you for or against? Why? Is a CSO a position you would be interested in holding? From your research, what are common responsibilities of a CSO.
Discuss the classical criminology and positivist criminology : You will be using one of the theories below and applying the theory to a musical song of your choice. The application piece must include defining the theory in your own words and then taking aspects of the song and applying it to the theory. Your..
Differentiation broad cost leader niche cost leader : Suppose the Digby company begins to compete through good designs, high awareness and easy accessibility for their existing products, what strategy would they be implementing? Select: 1 Niche differentiation Broad differentiation Broad cost leader Nic..
Explain in detail the potential impact of malicious attacks : Explain in detail the potential impact of the three selected malicious attacks. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.
Making plans for retirement : You plan to deposit $2,200 per year for 4 years into a money market account with an annual return of 3%. You plan to make your first deposit one year from today. What amount will be in your account at the end of 4 years? You and your wife are making ..
Cadbury market value rose : When Kraft recently bid $16.7 billion for Cadbury, Cadbury's market value rose, but Kraft's market value fell by more. What does this tell you about the value-creating potential of the deal?
Redefine the weave parameters : Redefine the weave parameters, first by 90o rotating the weaving pattern, and second by considering the opposite face of the weaving pattern, on both initial orientation and 90o rotated orientation of the weaving pattern. Is this a twill or a sati..
Effects of globalization impacted walmart ability : How have changes in the industry and the effects of globalization impacted Walmart'sability to successfully compete? List and describe two factors that are negatively impacting Walmart.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd