Exploited both network and host vulnerabilities

Assignment Help Basic Computer Science
Reference no: EM13714419

Answer edwin_1985 question on · Nov 06, 2014 at 12:07pm. Can you please help me with the similar project? I need a power point presentation. 

Prepare presentation slides on the security solution you would recommend. Show why your solution provides the best level of security. Assess the cost and the required resources of your solution.

================================

Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both network and host vulnerabilities.

The head of your company decides that security needs to be enhanced. The company network should be modified to prevent a majority of further attacks. Attacks that cannot be prevented should be at least detected. However, solutions for tolerating undetected attacks should also be envisioned. The head of the company charges you to come up with a plan. A rough estimate of the maximum cost of this task is: $500K for equipment and software and at least 1 full-time security administrator. However, the head of your company indicates that these numbers could change based on your proposal. Your goal is to propose the best plan that would provide the best level of security for adequate cost and resources.

The company already has a network of Linux computers for scientific research and a network of Windows computers for administrative tasks. Moreover, the company relies on its web server to advertise and sell some of its products. Both networks should be made more secure. Both networks should also be able to securely communicate.

Prepare presentation slides on the security solution you would recommend. Show why your solution provides the best level of security. Assess the cost and the required resources of your solution.

Reference no: EM13714419

Questions Cloud

Explain how the maxflow algorithm works : Explain how the maxflow algorithm works, elaborating on all cases and transitions that need to be considered during execution.
Identify the java-based technologies utilized : Five hundred words discussion paper. Identify the Java-based technologies utilized in this project and analyze each of them. Then, provide discussion on the purpose of each of the Java-based technologies utilized.
Mainframes are perceived as being more robust : QUESTION 1 Mainframes are perceived as being more robust than n-tier server architectures. True False
Compare and contrast physical access controls : Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.
Exploited both network and host vulnerabilities : Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both netwo..
The term means making an organization ready : QUESTION 1 The term means making an organization ready for possible contingencies that can escalate to become disasters.QUESTION 2 Mainframes are perceived as being more robust than n-tier server architectures.
Analysis summarizing the wireless design : Provide a 7 to 10 page analysis summarizing the wireless design to the executive management team. The summary should effectively allow the senior management to understand the organization security requirements and make the appropriate decisions..
Determine the activation energy in kj : Determine the activation energy in kJ/mol for a first order reaction if its specific rate constant 5.90e-05 s-1 at 400. K and 4.06e+02 s-1 at 600. K.
Tungsten with a mass numer of 185 and atomic number of 74 : Tungsten with a mass numer of 185 and atomic number of 74, decays by beta emissions. Identify the product of the nuclear reaction by its atomic symboll, mass number and atomic number?".'

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Encode audio data in two packets

How might you encode audio (or video) data in two packets so that if one packet is lost, then resolution is simply decreased to what would be expected with half bandwidth?

  Describe happening of water lubrication film under ice skate

Similar reasoning is utilized to describe occurrence of water lubrication film beneath ice skates. Describe your opinion of this explanation?

  Identify the basic operation of the following algorithm

Identify the basic operation of the following algorithm (that takes as input an array A[0... n-1] of n integers) and analyze its worst-case time complexity.

  Write the definition of the function min and a program

write the definition of the function min and a program to test this function. Add the function max to the class arrayListType to return the largest element of the list. Also, write the definition of the function max and a program to test this func..

  Increasing the number of cpus in a computer system tends to

increasing the number of cpus in a computer system tends to increase system performance. there are different types of

  Explaining kind of malicious software

What kind of malicious software is this? if username and password are valid return ALLOW_LOGIN else return DENY_LOGIN.

  Four ring architecture of operating systems

Opinion regarding what security benefit(s) would be seen if modern operating systems followed four ring architecture.

  Change arp entry in computer for mac address

Print your ARP cache table. Find a server on your local network. Change its ARP entry in your computer to point to your computer's MAC address. Print new ARP cache table. Now use the service and see what happens.

  What one characteristic about standard normal distribution

What one characteristic about the Standard Normal Distribution make it different from any normal distribution?

  Write a program that requests a state and category

Table 4.7 State Flower Nickname Motto California Golden Poppy Golden State Eureka Indiana Peony Hoosier State Crossroads of America Mississippi Magnolia Magnolia State By valor and arms New York Rose Empire State Ever upward Table 4.7 contains in..

  Design a payroll class

Write the appropriate accessor and mutator methods and a constructor that accepts the employee's name and ID number as arguments.

  Discuss whether design considerations need to change

Are there certain projects in which the traditional approach would work better? If not, explain why not. If so, give at least one example of such a project.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd