Cash-back offer from May 2nd to 7th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 12.00

CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks complete solution

Question posted by
Online Tutor Profile
request

CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks complete solution correct answer key

Identifying Potential Malicious Attacks, Threats and Vulnerabilities

 

 

You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 – Firewalls
2) 1 – Web / FTP server
3) 1 – Exchange Email server
4) 1 – Network Intrusion Detection System (NIDS)
5) 2 – Windows 2008 Active Directory Domain Controllers (DC)
6) 3 – File servers
7) 1 – Wireless access point (WAP)
8) 100 – Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and the potential impact it could have on the
organization.


Write a four to five (4-5) page paper in which you:


1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.
2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.
3. Analyze and assess all potential vulnerabilities that may exist in the documented network.

Available Answer
$ 12.00

[Solved] CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks complete solution

  • This solution is not purchased yet.
  • Submitted On 13 Jul, 2015 03:11:33
Answer posted by
Online Tutor Profile
solution
Day by day threats to a company’s intellectual property have grown to an alarming rate over the years. After looking at your network security, structure there are three specific threats that we will focus on that could have a Hugh impact on your business intellectual property and integrity. A well train hacker understands that every device or network has it weakness and they are trying to take advantage of it, the device that is most looked at are: servers, switches, routers, desktops, and security devices themselves. The first treat that can we should take about are Trojan Horse Viruses, how this malware works it hacker form the outside may send emails to work making it look like a work related email. Once it is installed it will make the user think that it is performing that task that it was meant to do. But on the backend this attack is give the hacker the ability to remote into your network granting the attacker user privileges on the computer or computers that give them access to or cause: Wasting of computer storage and memory resources • Causing the computer to crash • Viewing the screen of the user • Wasting of computer storage and memory resources • Deletion or modification of files • Keystroke logging • Software installation, such as additional malware • Uploading or downloading of files • Stealing of data, such as credit card data or passwords The second exploit we need to address are Logic Attacks. If your company is running Windows 2000 operating system, this form of attack gains access to your network without having a valid account. It take advantage of known bugs in programs to gain access to your system,...
Buy now to view the complete solution
Other Similar Questions
User Profile
Acade...

CIS 333 Week 4 Assignment 1 – Identifying Potential Malicious Attacks, Threats, and Vulnerabilities


Malicious Attacks

At the point when classifying the potential malicious attacks, threats, and vulnerabilities that this organization faced, it has been dead set that our machine framework or system resource has...

User Profile
Exper...

CIS 333 Week 3 Case Study 1 – Mobile Devices

Installing a wireless network in the workplace is becoming more common since it makes sense when talking about cost.  It is easier and cheaper to install a wireless network than installing fiber or CAT 6 around the bu...

User Profile
joe96

CIS 333 Week 10 Technical Project Paper – Information Systems Security

CIS 333 Week 10 Technical Project Paper – Information Systems Security...
User Profile
NUMBE...

Cis 333 week 10 Technical Project Paper

Technical Project Paper Professor: Arend Clayborn Cis 333 Networking Security Fundamentals 03/16/2015 After looking at your network security structure there are various physical threats that we will focus on that c...
User Profile
NUMBE...

Cis 333 week 6 case study 2 public key Infrastructure

Case Study 2: Public Key Infrastructure CIS 333 Network Security Fundamentals 02/17/15 Public key Infrastructure (PKI) will help the corporation to distribute and identify encryption keys between users so that info...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35