Preview

Identifying Potential Malicious Attacks Threats Essay Example

Satisfactory Essays
Open Document
Open Document
508 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Identifying Potential Malicious Attacks Threats Essay Example
Week 4 Assignment 1
Click the link above to submit your assignment.
Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
Due Week 4 and worth 100 points
You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls | 5) 2 – Windows 2008 Active Directory Domain Controllers (DC) | 2) 1 – Web / FTP server | 6) 3 – File servers | 3) 1 – Exchange Email server | 7) 1 – Wireless access point (WAP) | 4) 1 – Network Intrusion Detection System (NIDS) | 8) 100 – Desktop / Laptop computers | | 9) VoIP telephone system |

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.
Write a four to five (4-5) page paper in which you: 1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network. 2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization. 3. Analyze and assess all potential vulnerabilities that may exist in the documented network. 4. Illustrate in writing the potential impact of all identified vulnerabilities to the network and the organization. 5. Include at least three (3) references (no more than 2-3 years old) from material outside the textbook.
Your assignment must follow these formatting requirements: * Be typed, double spaced, using Times

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    is3110 lab 1

    • 626 Words
    • 3 Pages

    How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT…

    • 626 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Any event that causes damage to information resources, whether it is a computer virus, natural disaster or system failure could be devastating to an individual (i.e. identity theft), company, its customers, suppliers and shareholders. Failing to do so may threaten the survival of the company itself.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    The following risks, threats, and vulnerabilities were found in an IT infrastructure. Consider the scenario of a Healthcare provider under HIPPA compliance law and what compliance to HIPPA involves.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Richman Company is a successful and prosperous firm with branches in eight locations throughout the country and Canada. To support its growth, the company uses both an intranet and an extranet network. These networks are essential to the successful operation of the company because they provide the means of communicating with all employees, who use the intranet to enroll in company benefit programs. These networks also allow all of the company’s business partners, vendors and privileged customers to gain information about the company. In recent years, the company has been expanding rapidly. As one of the company’s interns, I have been asked to analyze the company’s vulnerabilities and make a plan to protect company assets and to utilize available technology most effectively. Before making the final proposal, I examined Richman’s use of the intranet and the extranet networks and found problems that require immediate attention.…

    • 1171 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Good Essays

    As everyone knows the Internet is not the most trusting place to put personal information of us; measures are needed to protect from harmful threats and vulnerabilities. The CIO should know that if the company doesn’t protect their Windows or Unix/Linux servers from unknown shortcomings and vulnerabilities, the company might get attacked by hackers, who want to steal confidential information to commit crimes, it could destroy the data or worst it could steal the data of which the company had save for many years (Records). Hackers typically use codes or malware in the form of viruses, worms, time bombs, logic bombs, Trojan, and many more. To corrupt a company’s network infrastructure and it is network operating system. Normally when they do this kind of things, they are looking to steal data, such as credit cards, property information, social security numbers, addresses, phone numbers, and anything else that could be used to identify a person or help duplicate a business. The CIO should have a way to protect the company’s network infrastructure from such catastrophes.…

    • 732 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 2 Lab

    • 507 Words
    • 3 Pages

    3.) From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5), specify whether the threat or vulnerability impacts confidentiality – integrity – availability:…

    • 507 Words
    • 3 Pages
    Good Essays