Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

i) 2 – Firewalls

ii) 1 – Web / FTP server

iii) 1 – Exchange Email server

iv) 1 – Network Intrusion Detection System (NIDS)

v) 2 – Windows 2008 Active Directory Domain Controllers (DC)

vi) 3 – File servers

vii) 1 – Wireless access point (WAP)

viii) 100 – Desktop / Laptop computers

ix) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly describe each item and the potential impact it could have on the organization.

prepare a four to five page paper in which you:

• Analyze and assess any potential malicious attacks and threats that might be carried out against network.

• Illustrate in writing potential impact of all identified malicious attacks and threats to network and organization.

• Analyze and assess all potential vulnerabilities that might exist in documented network.

• Illustrate in writing potential impact of all identified vulnerabilities to network and the organization.

Assignment should follow these formatting requirements:

Be typed, double spaced, using Times New Roman font size 12, with one-inch margins on all sides; citations and references should follow APA or school-specific format.

Specific course learning outcomes associated with this assignment are as follows:

• Describe the concepts of information systems security as applied to the IT infrastructure.

• describe the principles of risk management, common response techniques, and issues related to recovery of the IT systems.

• describe how malicious attacks, threats, and vulnerabilities impact the IT infrastructure.

• Describe the means attackers use to compromise systems and networks, and defenses used by the organizations.

• Use technology and information resources to research issues in the information systems security.

• prepare clearly and concisely about network security topics using suitable writing mechanics and technical style conventions.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95013

Have any Question? 


Related Questions in Computer Network & Security

Assignmentwan technologies paper research point-to-point

Assignment WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies as ...

Why do networking components need more examination from an

Why do networking components need more examination from an InfoSec perspective than from a systems development perspective? What value would an automated asset inventory system have for the risk identification process? W ...

Assignmentyour have been contracted by healthfirst hospital

Assignment Your have been contracted by HealthFirst Hospital Foundation (HHF), a charitable organization that provides services to community clinics in Atlanta, Georgia. Due to the organization's tremendous growth, it wi ...

Questions1 describe three factors that help to influence

Questions: 1. Describe three factors that help to influence our nation's focus on natural or man-made disasters. 2. What issues have been raised concerning some of the authorities granted to government agencies in the PA ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, ...

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

Project on security policyin this running case project you

Project on Security Policy In this running case project, you continue developing a secure network for SunGrafix, the video game development company for which you designed a network in the first week and are starting to p ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

Services in your arearesearch dsl and cable modem services

Services in your area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem services. Resea ...

Assignment network consultation for designitthis assignment

Assignment: Network Consultation for DesignIT This assignment contains two Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to comple ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen