Preview

Cis333 Assignment 1

Good Essays
Open Document
Open Document
987 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis333 Assignment 1
Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
As we know, video games have been around for many years, beginning with the simpler DOS based games to the more advanced internet role playing games. As technology has progressed, so have the security risks that come with online gaming. If we look at the number of households in America which play video games, we see the increased risk of information security.
With any network organization you want to make sure that you keep on top of vulnerabilities of anything that reaches out to the internet. Computers and servers that touch the internet are ones that must be scanned. As a company you have to make sure that you configure the security settings for the operating system, internet browser and security software. As a company you also want to set personal security policies for online behavior. There also needs to be an antivirus installed on the network like Norton or Symantec which blocks threats targeting the vulnerabilities.
With the firewalls you want to configure them in the reputable internet security program to block unsolicited request communication.
Email servers need to be sure that spam doesn’t get through the network. The ways that spam works is unwanted email messages get solicited to a large number of recipients. Spam should be a major concern in your infrastructure since it can be used to deliver email which can include Trojan horses, viruses, worms’ spyware and targeted attacks aimed specifically in obtaining sensitive and personal identification information. Microsoft Outlook has some known security risks. However, most of the security configurations would be set on the Exchange server and passed down to all clients.
With the organization running Windows 2008 domain controllers with an integrated Active Directory and an Exchange server for email functions, there are risks associated specifically to those types of operating systems. If you do not

You May Also Find These Documents Helpful

  • Good Essays

    1. Which of the following ordered pairs corresponds to an arrow on a mapping diagram that starts at 4 and ends at 1?…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    CIS 348 ASSIGNMENT 1

    • 960 Words
    • 4 Pages

    Describe the different levels and types of resources required for producing each deliverable described in the assignment summary.…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    A lot of networks have an email service, which allows people to communicate with each other. For a company, this is an advantage because employees can share sensitive information privately within the network.…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    RSM333 Assignment 2

    • 869 Words
    • 4 Pages

    The price of ABC will decrease by $0.5 per share, since the company is overpaying…

    • 869 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Assignment Chccn301B

    • 312 Words
    • 2 Pages

    What is appropriate supervision and how does it vary according to the age/stage of development?…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cis500 Week 2 Assignment

    • 1948 Words
    • 8 Pages

    Today, the world is experiencing significant technological revaluation at the main part of which is the information technology. There is a general belief that information technology eases and contributes to many aspects of our life (Nunn & Quinet, 2002). And new technologies has drastically changed our way of life to include attitudes, thoughts, perceptions and community at large. In particular, Information Technology has transformed our big world into a global village. Unlike the traditional means of law enforcement, in this case through street patrols, the adoption of Information Technology has brought a tremendous improvement to the law enforcement community and hugely impacted crime rate. In the past, random patrolling of the streets were carried out without proper organization with regards to insight, predictions of crime activities and the nature thereof. The use of IT in law enforcement centers around predictive policing which is the term used to describe “any policing strategy or tactic that develops and uses information and advanced analysis to inform forward-thinking crime prevention”. (Predictive Policing Symposium, 2010). Predictive policing focuses on some strategies which will be used in the remaining of this paper to address the comparison and cotrast of the use IT in policing versus random street patrols, how Inormation Systems have allowed police departments that implement tools such as COMPSTAT to respond to crime faster, and implementing the SWOT analysis on behalf of police departments that intend to implement predictive policing.…

    • 1948 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Rookie Chief Iso

    • 3874 Words
    • 16 Pages

    Oversee a network of security directors and vendors who safeguard the company's assets, intellectual property and computer systems, as well as the physical safety of employees and visitors.…

    • 3874 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    LAN - For the wired portion of our network, I propose a few solutions that will help secure our network. First we will need to ensure the safety of our equipment from tampering. We should have all switches and sensitive equipment (i.e. Servers and Network Attached Storage (NAS) Devices) in a room that is locked at all times. If available, we can use a card access system to monitor employees that gain access to this portion of our network.…

    • 904 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Inability to offer regard for the range of security preparing puts a venture at extraordinary hazard since security of organization assets is as much a human issue as it is an innovation issue. Another kind of NIST 800 is Electronic Mail Security. Electronic mail (email) is maybe the most prevalently utilized framework for trading business data over the Internet (or some other PC organize). And no more fundamental level, the email procedure can be isolated into two primary segments: first mail servers, which are hosts that convey, forward, and store email; and the second is mail customers, which interface with clients and enable clients to peruse, form, send, and store email. This record addresses the security issues of mail servers and mail customers, including Web-based access to mail. Mail servers and client workstations running mail customers are much of the time focused by aggressors. Since the figuring and systems administration advances that underlie email are universal and surely knew by numerous, assailants can create assault strategies to endeavor security shortcomings. Mail servers are additionally focused on in light of the fact that they (and open Web servers) must impart to some degree with…

    • 715 Words
    • 3 Pages
    Good Essays