Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

i) 2 – Firewalls

ii) 1 – Web / FTP server

iii) 1 – Exchange Email server

iv) 1 – Network Intrusion Detection System (NIDS)

v) 2 – Windows 2008 Active Directory Domain Controllers (DC)

vi) 3 – File servers

vii) 1 – Wireless access point (WAP)

viii) 100 – Desktop / Laptop computers

ix) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly describe each item and the potential impact it could have on the organization.

prepare a four to five page paper in which you:

• Analyze and assess any potential malicious attacks and threats that might be carried out against network.

• Illustrate in writing potential impact of all identified malicious attacks and threats to network and organization.

• Analyze and assess all potential vulnerabilities that might exist in documented network.

• Illustrate in writing potential impact of all identified vulnerabilities to network and the organization.

Assignment should follow these formatting requirements:

Be typed, double spaced, using Times New Roman font size 12, with one-inch margins on all sides; citations and references should follow APA or school-specific format.

Specific course learning outcomes associated with this assignment are as follows:

• Describe the concepts of information systems security as applied to the IT infrastructure.

• describe the principles of risk management, common response techniques, and issues related to recovery of the IT systems.

• describe how malicious attacks, threats, and vulnerabilities impact the IT infrastructure.

• Describe the means attackers use to compromise systems and networks, and defenses used by the organizations.

• Use technology and information resources to research issues in the information systems security.

• prepare clearly and concisely about network security topics using suitable writing mechanics and technical style conventions.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95013

Have any Question? 


Related Questions in Computer Network & Security

1overviewthe learning objective of this assignment is for

1 Overview The learning objective of this assignment is for students to get familiar with the concepts in the security techniques such as symmetric and asymmetric encryption, hashing and certificates in Public Key Infras ...

Summarize what pki is and how it works include the use of a

Summarize what PKI is and how it works. Include the use of a CA and also include why the backing up of these keys is so important. Directions: Your completed assignment should be at least 2 FULL double-spaced pages in le ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

Concepts and strategies for managing securityassignment

Concepts and Strategies for managing security Assignment Brief As part of the formal assessment for the MSc Information Systems you are required to submit a Information Systems Security assignment. Please refer to your S ...

Term paper security regulation compliancethis assignment

Term Paper: Security Regulation Compliance This assignment consists of two sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. L ...

Pcap challenge 1 objectivethe objective of this lab is

PCAP Challenge 1 Objective The objective of this lab is simple (although some of the questions will prove quite challenging), all you need to do is use the pcap file provided and investigate what transpired between 2 or ...

Introductionthis case study has been divided into six

Introduction This case study has been divided into six components. You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc), subnet the network using VLSM, an ...

Project- sample cyber security profileevery organization

Project- Sample Cyber Security Profile Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the curre ...

Provide at least three methods or tools used to attack web

Provide at least three methods or tools used to attack web servers as well as provide how each of these three methods can be protected against. Directions: Your completed assignment should be at least 2 FULL double-space ...

Term paper security regulation compliancethis assignment

Term Paper: Security Regulation Compliance This assignment consists of two sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. L ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate