You have just been hired as an information security


Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

You have just been hired as an Information Security Engineer for a video game development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 - Firewalls
2) 1 - Web / FTP server
3) 1 - Exchange Email server
4) 1 - Network Intrusion Detection System (NIDS)
5) 2 - Windows 2008 Active Directory Domain Controllers (DC)
6) 3 - File servers
7) 1 - Wireless access point (WAP)
8) 100 - Desktop / Laptop computers
9) VoIP telephone system

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and the potential impact it could have on the
organization.

Write a four to five (4-5) page paper in which you:

1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.

2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.

3. Analyze and assess all potential vulnerabilities that may exist in the documented network.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: You have just been hired as an information security
Reference No:- TGS01237351

Now Priced at $40 (50% Discount)

Recommended (99%)

Rated (4.3/5)

A

Anonymous user

2/6/2016 7:48:46 AM

Assume that you are selected as an Information security engineer for a video game development company. Now write a 4 to 5 page paper including the answer of the following questions. Question 1: Examine and assess any potential malicious attacks and threats which might be carried out against the network. Question 2: Describe in writing the potential impact of all recognized malicious attacks and threats to the network and organization. Question 3: Examine and evaluate all potential vulnerabilities which might exist in the documented network.