Saturday, July 20, 2013

CIS 341 Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

CIS 341 Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
Click link below (blue) to purchase Assignment



We have all assignments and case studies for CIS 341, we can also help with CIS 341 Quizzes, exams and other Strayer classes Email us if you need helpsupport@hwmojo.com


Strayer CIS 341Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
Due Week 4 and worth 75 points
You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:
1) 2 – Firewalls
2) 1 – Web / FTP server
3) 1 – Exchange Email server
4) 1 – Network Intrusion Detection System (NIDS)
5) 2 – Windows 2008 Active Directory Domain Controllers (DC)
6) 3 – File servers
7) 1 – Wireless access point (WAP) 8) 100 – Desktop / Laptop computers 9) VoIP telephone system
The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.
Write a four to five (4-5) page paper in which you:
1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.
2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.
3. Analyze and assess all potential vulnerabilities that may exist in the documented network.
4. Illustrate in writing the potential impact of all identified vulnerabilities to the network and the organization.
5. Include at least three (3) references (no more than 2-3 years old) from material outside the textbook.


No comments:

Post a Comment