You have just been hired as an information security


Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows 2008 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and the potential impact it could have on the
organization.

Write a four to five (4-5) page paper in which you:

1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.
2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.
3. Analyze and assess all potential vulnerabilities that may exist in the documented network.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: You have just been hired as an information security
Reference No:- TGS01237045

Now Priced at $40 (50% Discount)

Recommended (93%)

Rated (4.5/5)

A

Anonymous user

2/8/2016 6:24:06 AM

The assignment given is related to recognizing the potential malicious attacks, threats and vulnerabilities. The organization particularly has: 2-Firewalls, 1-Web/FTP server, 1-Exchange Email server, 1-Network Intrusion Detection System (NIDS), 2-Windows 2008 Active Directory Domain Controllers (DC), 3-File servers, 1-Wireless access point (WAP), 100-Desktop/Laptop computers and VoIP telephone system. As a Information Security Engineer you have to do the following: 1) Evaluate and find out any potential malicious attacks and threats that might be carried out against the network. 2) Describe in writing the potential impact of all recognized malicious attacks and threats to the network and the company.