Identifying potential malicious attacks

Assignment Help Basic Computer Science
Reference no: EM13928727

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows 2008 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and the potential impact it could have on the
organization.

Write a four to five (4-5) page paper in which you:

1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.

2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.

3. Analyze and assess all potential vulnerabilities that may exist in the documented network.

Reference no: EM13928727

Questions Cloud

What is meant by the term identity theft : In reference to a company sharing information that it has collected about a customer, what is meant by "opt-in"? By "opt-out"? In your opinion, which of these is preferable?
Series-parallel configurations : If three of these computers are placed in parallel aboard the proposed space station, what is the system reliability for the first 6 months of operation?
Creating a context diagram : Refer again to the information about the Reliable Pharmaceutical Service (RPS) at the end of Chapter 1, "The World of the Information Systems Analyst."
What net cash flow will the project produce in year ten : The project will require an additional invest- ment in working capital of $250,000 in year 0 and $150,000 at the end of year 1. What net cash flow will this project produce in year 10?
Identifying potential malicious attacks : You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:
Why preferred stock is referred to as preferred : 250- to 350-word paper explaining why preferred stock is referred to as preferred and what some of the features added to preferred stock are that make it more attractive to investors. Would you select preferred stock or common stock as an investme..
What are the year one and year two net cash flows : The marginal tax rate for Locus is 40 percent. What is the required net investment, and what are the year 1 and year 2 net cash flows?
What key concerns functional tactics address in marketing : What are three types of opportunities for sharing that form a sound basis for diversification or vertical integration? Give an example of each from companies you have read about.
Relationship between test scores, school characteristics : The purpose of this project is to analyze the relationship between test scores, school characteristics, and student demographic backgrounds for the California school districts. The data are based on all the 420 K-6 and K-8 districts in California ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a script that creates and calls a stored procedure

Write a script that creates and calls a stored procedure named insert_category. First, code a statement that creates a procedure that adds a new row to the Categories table. To do that, this procedure should have one parameter for the category name.

  Explaining process of making changes as recursive

You can view the process of making changes as recursive. You first see if any dollars are required, subtract them from the total, and then make change for what remains. Complete the LISP program to achieve the above requirements.

  2s complement representation

How would you take a decimal number and make it a word-length 2's complement representation?

  Logical expression

write a short paper on what your program does. Include the logical expression and what type of while loop (EOF, sentinel-controlled, counter-controlled, flag-controlled) you need. Using the same logical expression as above, use a different while l..

  Shared assets do not bring competitive advantage

Why does Hansen recommend that competition among members should not be issue because shared assets do not bring competitive advantage? Describe.

  Does company culture impact security

Does company culture impact security? If so, in what way? How does this fit into computer ethics?

  How many disk i-o operations needed to read contents

How many disk I/O operations might be need to read contents of small local file at /a/b/c? suppose that none of disk blocks is presently being cached.

  Prevent spoofing attacks by your own employees

(a) Your company will be held liable for any spoofing attacks that originate from within your network (i.e., packets leaving your network with spoofed IP header informa- tion). What can you do to prevent spoofing attacks by your own e..

  What normalization is used for and why

What normalization is used for and why

  A graph is two-connected iff

A graph is two-connected iff, removal of any single vertex and the edges adjacent to that vertex, leaves the graph connected. How can we tell if a graph is two-connected? Explain your algorithm in English

  Pre-processes the data items by adding dummy keywords

The data owner pre-processes the data items by adding dummy keywords so that each keyword matches the same number of data items

  Write a xml schema for the validation of the document notes

write a XML schema for the validation of the document notes.xml

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd