Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

i) 2 – Firewalls

ii) 1 – Web / FTP server

iii) 1 – Exchange Email server

iv) 1 – Network Intrusion Detection System (NIDS)

v) 2 – Windows 2008 Active Directory Domain Controllers (DC)

vi) 3 – File servers

vii) 1 – Wireless access point (WAP)

viii) 100 – Desktop / Laptop computers

ix) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly describe each item and the potential impact it could have on the organization.

prepare a four to five page paper in which you:

• Analyze and assess any potential malicious attacks and threats that might be carried out against network.

• Illustrate in writing potential impact of all identified malicious attacks and threats to network and organization.

• Analyze and assess all potential vulnerabilities that might exist in documented network.

• Illustrate in writing potential impact of all identified vulnerabilities to network and the organization.

Assignment should follow these formatting requirements:

Be typed, double spaced, using Times New Roman font size 12, with one-inch margins on all sides; citations and references should follow APA or school-specific format.

Specific course learning outcomes associated with this assignment are as follows:

• Describe the concepts of information systems security as applied to the IT infrastructure.

• describe the principles of risk management, common response techniques, and issues related to recovery of the IT systems.

• describe how malicious attacks, threats, and vulnerabilities impact the IT infrastructure.

• Describe the means attackers use to compromise systems and networks, and defenses used by the organizations.

• Use technology and information resources to research issues in the information systems security.

• prepare clearly and concisely about network security topics using suitable writing mechanics and technical style conventions.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95013

Have any Question? 


Related Questions in Computer Network & Security

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

Assignment windows network servicesproposalovervieweach

Assignment: Windows Network ServicesProposal Overview Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at lea ...

Learning team recommend pki technologythe head network

Learning Team: Recommend PKI Technology The head network engineer at ACME Corp. is concerned about nefarious parties being able to freely plug in devices to the company LAN. Even though he is skilled at network administr ...

Taskspecific issues that you need to address in the forum

Task Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. As thi ...

Assignment descriptionassignment overviewfor this

Assignment Description Assignment Overview For this assignment you will evaluate a Network Security Software. Marks will be awarded based on the sophistication and the difficulties the demonstration explored. Your task i ...

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

Security in wireless lans wans and telephonyactions for

Security in Wireless LANs, WANs, and Telephony Actions for 'Security in Wireless LANs, WANs, and Telephony A very challenging issue in IT industry is wireless security. Because of the specific technical principles involv ...

Assignment wireless technologythere are a number of

Assignment: Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen