CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks Correct Answers

Assignment discussing different types of malicious attacks with accurate responses.

Zoe Jordan
Contributor
4.3
43
5 months ago
Preview (2 of 6 Pages)
100%
Purchase to unlock

Page 1

CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks Correct Answers - Page 1 preview image

Loading page image...

Identifying Potential Malicious Attacks, Threats and VulnerabilitiesCIS 333 Week 4 Assignment 1 Identifying Potential Malicious AttacksCorrect AnswersIdentifying Potential Malicious Attacks, Threats and VulnerabilitiesYou have just been hired as an Information Security Engineer for a video game developmentcompany. Theorganization network structure is identified in the below network diagram and specifically contains:1) 2Firewalls2) 1Web / FTP server3) 1Exchange Email server4) 1Network Intrusion Detection System (NIDS)5) 2Windows 2008 Active Directory Domain Controllers (DC)6) 3File servers7) 1Wireless access point (WAP)8) 100Desktop / Laptop computers9) VoIP telephone systemThe CIO has seen reports of malicious activity being on the rise and has become extremely concerned with theprotection of the intellectual property and highly sensitive data maintained by your organization.As one of your firsttasks with the organization,the CIO requested you identify and draft a report identifying potential malicious attacks,threats, and vulnerabilities specific to your organization. Further,the CIO would like you to briefly explain each item andthe potential impact it could have on theorganization.Write a four to five (4-5) page paper in which you:1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and theorganization.3. Analyze andassess all potential vulnerabilities that may exist in the documented network.

Page 2

CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks Correct Answers - Page 2 preview image

Loading page image...

Preview Mode

This document has 6 pages. Sign in to access the full document!

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all