Studybay uses cookies to ensure that we give you the best experience on our website. By continuing to use Studybay you accept our use of cookies view more on our Cookie Policy
ASSIGNMENT ID
90830
SUBJECT AREA Computer Science
DOCUMENT TYPE Research Paper
CREATED ON 30th January 2017
COMPLETED ON 30th January 2017
PRICE
$40
18 offers received.
Expert hired: technologiestutor

Assignment 1: Identifying Potential Malicious Attacks, Threats and Vulnerabilities

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls 5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC) 2) 1 – Web / FTP server 6) 3 – File servers 3) 1 – Microsoft Exchange Email server 7) 1 – Wireless access point (WAP) 4) 1 – Network Intrusion Detection System (NIDS) 8) 100 – Desktop / Laptop computers 9) VoIP telephone system Network Diagram The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization. Write a four to five (4-5) page paper in which you: Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization. Explain in detail the potential impact of the three (3) selected malicious attacks. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks. Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network. Explicate the potential impact of the three (3) selected concerns for data loss and data theft. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Explain the concepts of information systems security as applied to an IT infrastructure. Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems. Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. Explain the means attackers use to compromise systems and networks, and defenses used by organizations. Use technology and information resources to research issues in information systems security. Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.
You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls 5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC) 2) 1 – Web / FTP server 6) 3 – File servers 3) 1 – Microsoft Exchange Email server 7) 1 – Wireless access point (WAP) 4) 1 – Network Intrusion Detection System (NIDS) 8) 100 – Desktop / Laptop computers 9) VoIP telephone system Network Diagram The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.
Show More
This project has already been completed on Studybay
On Studybay you can order your academic assignment from one of our 45000 project experts. Hire your expert directly, without overpaying for agencies and affiliates!
Check the price for your project

See other similar orders

Perception and Expectations of how Female Body Images have changed over Centuries
I need a visual essay with 4 to 5 pages of information and 2 pages of images. Images can be integrated within essay or at the end. Images need to be referenced and indicated within the essay. I will attach some information that I have found that I would like to see in this essay.
Other types
Sociology
What correlations did your research show between environmental and health issues in the school-aged child?
Research children's health issues, focusing on environmental factors and links to poverty. The assessment of environmental processes includes agents and factors that predispose communities and populations to injury, illness, and death. What correlations did your research show between environmental and health issues in the school-aged child? Make..
Coursework
Nursing
physical and emotional assessment findings the nurse may see that could indicate child abuse.
Child abuse and maltreatment is not limited to a particular age and can occur in the infant, toddler, preschool, and school-age years. Choose one of the four age groups (infant, toddler, preschool, or school age) and discuss the types of abuse that are most often seen in this age. Discuss warning signs and physical and emotional assessment findings the nurse..
Coursework
Nursing
Grant Proposal – Proposed Study, Budget, and Draft Grant Proposal
For your final project, you will finalize your grant proposal to secure funding for a neuroscience investigation. This assignment will involve integrating information covered in previous weeks about brain networks and disorders that occur as the result of dysfunction in these networks. The grant proposal will require you to identify a research question..
Research Proposal
Psychology
mass incarceration: How to improve prenatal care for incarcearcted women
research paper on mass incarceration and improvements of prenatal care for imprisoned women with in the united states preferably in the state of California( if possible). this paper need to relatable, locatable, and have a solution on how to improve prenatal care. Needs to be 9-10 pages long MLA format https://www.aclu.org/map/state-standards-pregnancy-related-health-care-and-abortion-women-prison-map..
Research Paper
English Language
Why do we have more poverty in America compared to many other industrialized societies?
In answering the following question, discuss how the historical foundations of social welfare continue to influence social reform debates within American society today and consider residual or institutional conceptions of social welfare, relevant social theories, and the functions of social welfare. Compare US with England and Germany..
Coursework
Social Work
President Donald Trump and Healthcare in the United States
Assignment 1 meets the following course objectives: Apply a sociological perspective to the social world. Analyze contemporary social issues using the sociological imagination and use sociological theories and concepts to analyze everyday life. Demonstrate the ability to identify, locate, and retrieve information related to the topics in the course...
Essay
Sociology
Ethics and Social Responsibility (Needed later this evening 01/29/2017)
make sure the references I can get to them and are accessible by me and make sure most of the the references are peer reviewed or scholarly . he purpose of this assignment is to help students understand the influence that ethics and social responsibilities have on the strategic planning process. Assignment Steps Write a 700-word report in which you address the..
Term paper
Business
Assignment based on a case study of Wal-Mart’s Global Operations
This assignment is based on a case study of Wal-Mart’s global operations. The details of the case are included in the attached articles. Answer following questions by using appropriate theories and the case study materials. 1. Distinguish following international entry modes: acquisitions, greenfield investments, and joint ventures. Outline what factors..
Term paper
Economics
compare and contrast Japanese religious ideals in the sixteenth century: Shinto, Buddhism, and Catholicism.
Submit your Annotated Bibliography. Begin the annotated bibliography with a statement of your argument. The sources that follow must include at least four scholarly sources and at least two primary sources. No more than two general website sources may be used (and those are not required). Your textbook does not count as one of these sources. For assistance..
Annotated Bibliography
History
: Journal Article Critique #1 PAPER NEEDS TO BE DONE IN 10 HOURS.
For any in-text referencing and the full article reference at the end of your report, follow APA referencing format--a brief overview of APA format with regard to referencing can be found in your syllabus and is repeated in a document in Course Resources on the home page. Submit a two-page critique for this assignment. Do not merely summarize the author's points...
Article
Psychology
Theoretical framework of classifying market efficiency
It is widely assumed that “Asset Prices such as stock prices always incorporate the best information about fundamental values and that prices change only because of good, sensible information” (Shiller, 2003, page 83) Describe a theoretical framework of classifying market efficiency and assess to what extend the about quote is relevant in terms of explaining..
Term paper
Business
comparison between alcohol-based hand rub and hand washing to reduce infection among HCWs
my subject: In health care workers does alcohol-based hand rub (hand sanitizers) compared to hand washing (water and soap) result in reducing infection (hand contamination) Please make sure that you consider that my requested assignment is An academic written assignment, I am doing my BSE in Nursing in Cardiff university and I am doing Evidence Based Practice..
Literature / Movie review
Health
Research on universities' Campus Space Utilization
Hi , Expectation is : Browse through the universities about the Campus Space utilization .Any Reports/Analytics/Dashboards that you can find regarding space utilization on their website. Report Format : 1. I have attached the file, so kindly continue further in that file. Your role : 2. List down the university along with the lnk which is redirecting to their..
Reports
Management
Should public schools adopt a school uniform policy
See Attached File: Based on your work in Units 1 and 2, create a detailed sentence outline for your research paper. Your outline should include the following: Thesis statement: Because you are writing an argument or persuasive paper, your thesis must state a clear stance on the topic that you have selected. The thesis should be written in the third person and not..
Essay
Other

Studybay assignment progress timeline

Studybay is a freelance platform where you can order a Assignment 1: Identifying Potential Malicious Attacks, Threats and Vulnerabilities paper, written from scratch by professors and tutors.
30 January 2017
User created a project for Computer Science
30 January 2017
18 experts responded
30 January 2017
User contacted expert technologiestutor
30 January 2017
User hired expert technologiestutor who offered a price of $40 for the project and has experience doing similar projects
30 January 2017
The expert completed the project Assignment 1: Identifying Potential Malicious Attacks, Threats and Vulnerabilities for 0 day, meeting the deadline
30 January 2017
User accepted the project right away and completed the payment
30 January 2017
User left a positive review

Other projects in this subject area

Random blog posts

An Innovative Culture Makes A BUSINESS More Effective Business Essay
Growth creates a need for structure and self-control, organisation changes which can stress the culture of creativity that is so essential to future success. To preserve competitive advantage, companies need to institutionalise the development process; they need to create an interior environment where creative thinking is central with their prices, assumptions and activities. Management changes and management generally is approximately implementation. When..
Innovative culture
An Overview WITHIN THE Mysterious Creature
Bigfoot is a mystical creature that is characteristic - features very large, with feathers that cover the whole body. Bigfoot reportedly within the parts of Canada and THE UNITED STATES since the 19th century. Because of the trail leg is predicted weighed 400 pounds. Bigfoot is also known as Sasquatch or Skunk also sometimes called monkey. Sasquatch is a tale that circulated family pets in North America. Bigfoot, which means big ft are huge animals the remnants of historic times...
Human being
Fugate family
Kappa kappa
An SUMMARY OF Sufferer Support Criminology Essay
Victim Support is the oldest sufferer organisation with an increase of than 35 years of experience as well as the most significant worldwide. There three aims are simply to aid, help deal with crime and present any sort of information to victims (Marshall, 1999). They have got many charity and witness service companies within them. There are numerous ways in which these programs process. It can be a victim-offender mediation process, where the mediators discuss the criminal..
Justice system
Criminal justice
Restorative justice
Criminal offenses
An Overview Of Tirupati Travel and leisure Essay
Tirupati Tirupati is one of the most important pilgrimage vacation spot in India. The town is found in the southern Indian condition of Andhra Pradesh at the foothills of the Eastern Ghats. The town is famous for the Sri Venkateshwara temple as pulls thousands of travellers and devotees each year.   Significance The city of Tirupati appears to derive its name from the hallowed Tirumala hills which are allegedly the second oldest rock and roll mountains on earth and discover..
Lord shiva
Lord vishnu
Lord krishna
Lord rama
An SUMMARY OF The Relevance Theory British Language Essay
In Relevance: Communication and cognition, Sperber and Wilson (1986, 1995) present a fresh approach to the study of individual communication. Relevance Theory is dependant on the view that real human cognition is intended for the maximization of relevance, which communicated information comes with a assurance of relevance. This is what Sperber and Wilson name the Principle of Relevance. The theory has sparked a great deal of research since it was presented, either assisting..
Most relevant
An Overview Of A Multinational Company Business Essay
The Lot of money 500 and Louisville, Kentucky-based company, Yum! Brands, Inc. is the epitome of today's multinational working company. With several different restaurant chains, including Kentucky Fried Chicken breast (KFC), Pizza Hut, Taco Bell, Long John Silver's, and much more, Yum! Brands Inc. suits a consumer basic by encompassing a multitude of food genres on the multinational level. The franchise even builds co-branding restaurant sites, which feature two or more..
Junk food
Fast food
Indian market
Human being
An Over View ON THE DHL Company
DHL has had the opportunity to make a strong image with the public through an intensive occurrence on the streets and a daring and smart brand. This has meant that image has been maintained with reduced advertising, as DHL are advertising themselves and new services when the public see their fleet of vehicles on the road. Together with brilliant sponsorship of events such as Method 1, this has resulted in the general public belief of DHL being truly a brand that is strong and reliable..
Sales team
Logistics industry
Service centre
Same person
Deutsche post
An Over View Of The Product Super Jam Marketing Essay
As a youngster, Fraser Doherty from Edinburgh, Scotland was always considering the creative procedure for discovering simple products that people wanted to buy and was always seeking to grow vegetables and appearance after chickens in his parents garden. At the age of 14, his grandmother educated him steps to make jam, and the same day he made a few jars and sold them to the neighbours. He appreciated making jam that folks enjoyed and noticed it as a possible way to make a little..
Marketing strategy
Online marketing
Brand power
Brand value
An Format of Global Weather Change on Earth
There is no question that the accumulating evidence is recommending that the Earth's environment is constantly changing in immediate consequence because of human being activity. The most important of which triggers the release of greenhouse gases in to the atmosphere from fossil fuels. A report from the United Nations' Intergovernmental Panel on Local climate Change (IPCC) believed the Earth's average land and sea surface temperatures has increased by 0. 6 ± 0...
Global climate change
Skin tightening
Climate change
Weather change
Global climate
An Organizational Culture Inventory Analysis
All firms and corporations have their own different culture and plainly defined objectives from its stakeholders, for case, some firms sets a competitive environment in the firm that makes its employees want to out-do one another by achieving better results, while other businesses give a cooperative environment and makes its employees believe that they unite and deliver on results as a team. The Organizational Culture Inventory (OCI) is made up of a set of 120 recommendations,..
Organizational culture
Organizational culture inventory
Behavioral norms
50th percentile
An organisation evaluation of twycross zoo
For my unit 1 my activity to complete product 1 I'll research 20 local organisations i quickly will pick one organisation and appearance involved with it more. This company with be Twycross zoo. I will be researching this organisation utilizing the internet like company's website and review website to get the business's information and people and business people's opinions, phonebook by looking at business's name and what they do, my local institutions and business have..
They need
Their hands
An Explanation Of Disability Sociology Essay
Different countries and organizations have their own classification towards the term disability and therefore, it is difficult to find an exact explanation for disability. For instance, the earth Health Organization (1980) defines impairment in terms of impairment. It relates it as disruptions in body structures or functions which causes loss in function or abnormality in no matter emotional or physiological area. In Taiwan, relating to disability means having incidents..
Sociological model
Same time
Biomedical model
Hong kong
An introduction to the LVMH brand
LVMH is a luxury brand located in Paris. The business employees are about 56, 000 people from across the world where just 33 percent33 % are from France. The company was proven in 1987 with 50 esteemed luxury brands. LVMH is a decentralized company, growing, growing and constantly acquiring new businesses. The core principles of the company are "being creative and innovative", "aiming for product excellence", "promoting our brands with passion", and "acting as entrepreneurship..
Corporate objectives
An Introduction To Banking In Nepal
"Lender" originally produced from the term "Banco" signifying "Bench" is referred to as a financial institution which are set up in order to provide financial services to its customers while supporting the investors at the same time. (De Alberquque, M. , 1855) These are licensed by the federal government so as to assist in the monetary areas of the country. As opposed to Nepal, generally Nepal Rastra Loan company (NRB) the central Bank or investment company of Nepal has split..
Same time
Every single
External environment
High market
Advanced technology
An Inverted Tooth Chain Engineering Essay
An inverted-tooth chain operates silently and smoothly which is also called a silent string. Silent chain contains some toothed website link plates set up on joint components in a way that allows free flexing between each pitch. One's teeth on the hyperlink plates mesh with a sprocket, like the way a rack meshes with a products. The great majority of silent string is utilized in drives. Silent chains are made of stacked rows of weight carrying link plates. Increasing the number..
Silent chain
Bosch rexroth
Inverted teeth
An Intro To Welding
Welding can be defined as a long lasting joining process that produces coalescence of materials by heating them to the welding heat, with or without the use of pressure or by the application of pressure alone, and with or without the utilization of filler steel [8]. Ibrahim [10] described welding as a process of permanent signing up for two materials usually metals through localised coalescence resulting from suitable combination of temps, pressure and metallurgical conditions...
Fillet weld
Weld pool
Robotic welding
Welding process
An Introduction to the Skoda Company
The two cyclists, who had been known as Vaclav Laurin and Vaclav Klement, are believed as the founders of Skoda Company. Both cyclists were used to design and produce their own bicycles and eventually it was founded as Skoda. In 1925, Skoda was established in Czechoslovakia and steadily, it was expanded towards Eastern Europe by producing vehicles, farm ploughs, and aero planes apart from bicycles. Skoda must cope with crisis in company background such as conflict, economic..
Macro environment
Customer satisfaction
Enterprise environment
Business enterprise
Swot analysis
An Intro To SLEEP PROBLEMS And Somnambulism Mindset Essay
Sleep disorder can be defined as sleep difficulty or disruption of sleep. Sleep disorder that contain reached a very serious level can cause emotionally or psychologically disturbance to that person. Furthermore, sleeping disorder may also cause murder for such as sleepwalking murder. Examples of common sleep problems are insomnia, sleepwalking (somnambulism), and teeth grinding (bruxism) and so on. Basically, sleeping disorder can be split into four types: Dyssomnias,..
Sleep disorders
An Launch To Distance Learning
Distance learning is a form of education which includes been made up of the purpose of delivering education among those students who are not able to attend regular institution anticipated to various reasons. It can be defined as a education system to build as well as offer access to learning in a situation where the source of education and learner are away from one another because of the time and distance. In simple, we can say that distance education is an excellent way to offer education..
Distance education programs
Same time
Distance learning
Distance education
An Launch To Counselling Mindset Essay
Within this article, the key ideas and concepts of the individual centred approach to counselling will be evaluated and discussed how they advise and effect a person centred approach to counselling. Person centred theory or person centred counselling is the theory of counselling which originated from Carl Rogers. Actually this kind of counselling was also known as a 'nondirective procedure' to therapy or 'customer centred therapy' (Gladding, 2011). Zimring and Raskin..
Necessary sufficient
Positive regard
Unconditional positive regard