Identify potential malicious attacks

Assignment Help Computer Network Security
Reference no: EM131412298

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.
For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.
Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.
Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).
Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

Reference no: EM131412298

Questions Cloud

Compute the percentage total return : Stock Valuation: A stock has an initial price of $100 per share, paid a dividend of $2.00 per share during the year, and had an ending share price of $125. Compute the percentage total return, capital gains yield, and dividend yield. (Please prov..
What is harcourt net payment : Harcourt Corp. issues fixed rate date at 9%. It agrees to an interest rate swap which calls for it paying LIBOR to Brandt Co. and receiving 8.5% from Brandt. What is Harcourt's net payment?
What types of forces exist between two neutrons in nucleus : What types of forces exist between 2 neutrons in the nucleus? How is a nuclear power plant similar to a conventional coal burning power plant in creating electricity?
What is harcourt net payment : Harcourt Corp. issues fixed rate date at 9%. It agrees to an interest rate swap which calls for it paying LIBOR to Brandt Co. and receiving 8.5% from Brandt. What is Harcourt's net payment?
Identify potential malicious attacks : identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.
Design an asynchronous circuit to implement this function : The input values are shown on the arcs; the state names and the output values of the stable states are shown in the circles. Design an asynchronous circuit to implement this function.
Exchange rate between the us dollar and euro : Suppose the exchange rate between U.S. dollars and Swiss francs is SF 1.0576 = $1.00, and the exchange rate between the U.S. dollar and the euro is $1.00 = 1.1211 euros. What is the cross-rate of euros to Swiss francs (Euro/SF)?
The year of encryption : Formulate a possible solution that utilizes symmetric or asymmetric cryptography, and describe the advantages and disadvantages of the selected solution.
Write a comment about the malnutrition : You find malnutrition a very frustrating topic. In countries rich with food supplies people suffer from malnutrition due to financial, educational or personal choice deficits. In countries with poor food supplies there seems to be the same issue..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Computer networks assignment

This assignment is designed to test your understanding of computer networks through problem solving, literature study, simple analysis and problem solving.

  How a bluetooth radio module functions as radio transmitter

Explain how a Bluetooth radio module functions as a radio transmitter or a receiver (transceiver) at the Bluetooth radio-frequency (RF) layer.

  Describe what security threats in installing wireless lan

Write a two- page letter to describe what security threats she is facing and how she can decraese these threats. Remember that you are writing for friend, not for a teacher.

  Problem regarding the cyber-attack

This exercise is to identify and characterize assets. Imagine there is a severe natural calamity in your area and your personal vehicles have been rendered immobile. The local mayor is running school buses on their routes to evacuate residents and..

  Prepare a security policy for your organization

Your boss has asked you to prepare a security policy for your organization addressing a new option he wants to pilot - Bring Your Own Device (BYOD).

  Network security fundamentals

The Chief Executive Officer (CEO) and other business staff have no knowledge of network security or the threats they face. They have an open position for a Chief Information Security Officer (CISO), but have yet to fill it. Thus, they hire you for..

  Examine the it support requirements for the employee devices

Examine the IT support requirements for the employee devices. Examine potential security risks, data breaches, and lost devices. Provide guidelines on how these risks could be mitigated.

  Why is network security critical to financial institutions

Why is network security critical to financial institutions? The Blog topic is based on ‘Banks Banking on Network Security' (Closing Case Study Two, Section 11/Plug in B5 - Integrating the Enterprise, IS Function & IS Technologies).

  Demonstrate in the program

Write a Java program (non-GUI preferred) that has a method named atomic(). Demonstrate in the program how two threads can, sometimes, invoke atomic() concurrently. Create a second version of the program in which the two threads cannot invoke atomic c..

  Discuss the issue of security challenges on the internet

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least 5 Internet security challenges

  Define the physical and network security issues

Draft a description of the physical and network security issues and concerns at each Riordan plant. Draft a description on the data security issues and concerns present at each Riordan plant.

  How situation would be handled and what steps to begin with

Discuss how the situation would be handled and what steps to begin with. Examine how data would be retrieved and/or destroyed. Address what steps would be taken to determine the culprit.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd