CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks Correct Answers

Assignment discussing different types of malicious attacks with accurate responses.

Zoe Jordan
Contributor
5.0
39
about 1 month ago
Preview (2 of 6)
Sign in to access the full document!
Identifying Potential Malicious Attacks, Threats and Vulnerabilities
CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks Correct Answers
Identifying Potential Malicious Attacks, Threats and Vulnerabilities
You have just been hired as an Information Security Engineer for a video game development company. The
organization network structure is identified in the below network diagram and specifically contains:
1) 2 Firewalls
2) 1 Web / FTP server
3) 1 Exchange Email server
4) 1 Network Intrusion Detection System (NIDS)
5) 2 Windows 2008 Active Directory Domain Controllers (DC)
6) 3 File servers
7) 1 Wireless access point (WAP)
8) 100 Desktop / Laptop computers
9) VoIP telephone system
The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the
protection of the intellectual property and highly sensitive data maintained by your organization.As one of your first
tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks,
threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item and
the potential impact it could have on the
organization.
Write a four to five (4-5) page paper in which you:
1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.
2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the
organization.
3. Analyze and assess all potential vulnerabilities that may exist in the documented network.
Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

University
Strayer University
Subject
Information Technology

Related Documents

View all