Cis 333 Wk 8 Assignment 2 Identifying Potential Risk

In: Business and Management

Submitted By activitymode
Words 1027
Pages 5
CIS 333 WK 8 ASSIGNMENT 2 IDENTIFYING POTENTIAL RISK
To purchase this visit here: http://www.activitymode.com/product/cis-333-wk-8-assignment-2-identifying-potential-risk/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 333 WK 8 ASSIGNMENT 2 IDENTIFYING POTENTIAL RISK
CIS 333 WK 8 Assignment 2 - Identifying Potential Risk, Response and Recovery In Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities, you were recently hired as an Information Security Engineer for a videogame development company. After viewing a growing number of reports detailing malicious activity, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. He asked you to include a brief explanation of each item and the potential impact it could have on the organization.
After review of your report, the CIO requests that you develop a follow-up plan developing a strategy for dealing with all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in
Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk previously identified.
Write a four to five (4-5) page paper in which you:
1. For each malicious attack and threat identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance).
2. For each malicious attack and threat identified in Assignment 1, develop controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk.
3. For each vulnerability identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk…...

Similar Documents

Identifying Potential Risk, Response, and Recovery

...Assignment 2: Identifying Potential Risk, Response, and Recovery Emory Evans August 26, 2012 Dr. Robert Whale CIS 333 There are a myriad of potential threats and vulnerabilities that leave a system open to malicious attack, anytime you have a computer network that connects to the internet there is a potential for malicious attack so it is important that you know the vulnerabilities of a system to protect it from potential threats and malicious attacks. “A vulnerability is any weakness in a system that makes it possible for a threat to cause harm.” (Kim & Solomon, 2012, p. 96). There are several common vulnerabilities that exist within the seven domains of an IT infrastructure for example there is the lack of awareness or concern for security policy vulnerability in the User Domain as well as intentional malicious activity ( Kim & Solomon, 2012). Within the Workstation Domain there exists unauthorized user access, weakness in installed software, and malicious software introduced vulnerabilities, unauthorized network access, transmitting private data unencrypted, spreading malicious software, exposure and unauthorized access of internal resources to the public, introduction of malicious software, loss of productivity due to internet access, denial of service attacks, brute-force attacks on access and private data are all examples of vulnerabilities within the seven domains of IT infrastructure which are User, Workstation, LAN...

Words: 705 - Pages: 3

Assignment 2: Identifying Potential Risk, Response, and Recovery

...policies for the site are properly implemented. Firewalls are the basis of computer and network security defense. They are widely deployed. They are very hard to configure properly, and people who configure them may not know the current threats and attacks. For example, an administrator maybe working on some task and might leave something open in a firewall where attackers can enter through. Some firewalls have the vulnerability that enables attackers and be defeated. By identifying the network components, you can evaluate their vulnerabilities. These vulnerabilities can have flaws in the technology, configuration, or security policy. Vulnerabilities can be fixed different ways, applying software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software. Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk. As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port 443), which are open in many networks. By using access control devices, they can detect malicious exploits aimed at these services. Now these days applications has improve and very hard for hackers to get into but the technology need to stay up to date and be more intelligent. The attack methodology requires firewalls to provide not only access......

Words: 1056 - Pages: 5

Cis 333 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

...CIS 333 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities http://homeworktimes.com/downloads/cis-333-assignment-1-identifying-potential-malicious-attacks-threats-vulnerabilities/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities http://homeworktimes.com/downloads/cis-333-assignment-1-identifying-potential-malicious-attacks-threats-vulnerabilities/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities http://homeworktimes.com/downloads/cis-333-assignment-1-identifying-potential-malicious-attacks-threats-vulnerabilities/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities http://homeworktimes.com/downloads/cis-333-assignment-1-identifying-potential-malicious-attacks-threats-vulnerabilities/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities http://homeworktimes.com/downloads/cis-333-assig...

Words: 351 - Pages: 2

Cis 333 Assignment 2 Identifying Potential Risk, Response, and Recovery

...CIS 333 Assignment 2 Identifying Potential Risk, Response, and Recovery http://homeworktimes.com/downloads/cis-333-assignment-2-identifying-potential-risk-response-and-recovery/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Assignment 2 Identifying Potential Risk, Response, and Recovery http://homeworktimes.com/downloads/cis-333-assignment-2-identifying-potential-risk-response-and-recovery/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Assignment 2 Identifying Potential Risk, Response, and Recovery http://homeworktimes.com/downloads/cis-333-assignment-2-identifying-potential-risk-response-and-recovery/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Assignment 2 Identifying Potential Risk, Response, and Recovery http://homeworktimes.com/downloads/cis-333-assignment-2-identifying-potential-risk-response-and-recovery/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : onlineeducationalservice@gmail.com CIS 333 Assignment 2 Identifying Potential Risk, Response, and Recovery http://homeworktimes.com/downloads/cis-333-assignment-2-identifying-potential-risk-response-and-recovery/ For More Tutorial Visit: http://homeworktimes.com/ For any Information Email Us: : ......

Words: 418 - Pages: 2

Cis 333 Week 4 Assignment 1 - Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

...CIS 333 WEEK 4 Assignment 1 - Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Identifying Potential Malicious Attacks, Threats, and Vulnerabilities To Purchase Click Link Below: http://strtutorials.com/CIS-333-WK-4-Assignment-1-Identifying-Potential-Malicious-Atta-CIS3332.htm CIS 333 WK 4 Assignment 1 - Identifying Potential Malicious Attacks, Threats, and VulnerabilitiesIdentifying Potential Malicious Attacks, Threats, and Vulnerabilities You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls 2) 1 – Web / FTP server 3) 1 – Exchange Email server 4) 1 – Network Intrusion Detection System (NIDS) 5) 2 – Windows 2008 Active Directory Domain Controllers (DC) 6) 3 – File servers 7) 1 – Wireless access point (WAP) 8) 100 – Desktop / Laptop computers 9) VoIP telephone system The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could......

Words: 289 - Pages: 2

Cis 333 Week 4 Assignment 1 - Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

...CIS 333 WEEK 4 Assignment 1 - Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Identifying Potential Malicious Attacks, Threats, and Vulnerabilities To Purchase Click Link Below: http://strtutorials.com/CIS-333-WK-4-Assignment-1-Identifying-Potential-Malicious-Atta-CIS3332.htm CIS 333 WK 4 Assignment 1 - Identifying Potential Malicious Attacks, Threats, and VulnerabilitiesIdentifying Potential Malicious Attacks, Threats, and Vulnerabilities You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls 2) 1 – Web / FTP server 3) 1 – Exchange Email server 4) 1 – Network Intrusion Detection System (NIDS) 5) 2 – Windows 2008 Active Directory Domain Controllers (DC) 6) 3 – File servers 7) 1 – Wireless access point (WAP) 8) 100 – Desktop / Laptop computers 9) VoIP telephone system The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could......

Words: 289 - Pages: 2

Assignment 2: Identifying Potential Risk, Response, and Recovery

...Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization. After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified. Write a four to five (4-5) page paper in which you: For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale. For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each......

Words: 486 - Pages: 2

Cis 333 Wk 4 Assignment 1

...CIS 333 WK 4 ASSIGNMENT 1 To purchase this visit here: http://www.activitymode.com/product/cis-333-wk-4-assignment-1/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 333 WK 4 ASSIGNMENT 1 CIS 333 WK 4 Assignment 1 - Identifying Potential Malicious Attacks, Threats, and Vulnerabilities The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization. Write a four to five (4-5) page paper in which you: 1. Analyze and assess any potential malicious attacks and threats that may be carried out against the network. 2. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization. 3. Analyze and assess all potential vulnerabilities that may exist in the documented network. 4. Illustrate in writing the potential impact of all identified vulnerabilities to the network and the organization. 5. Include at least three (3) references (no more than 2-3 years old) from material outside the textbook. Activity mode aims to provide quality study......

Words: 766 - Pages: 4

Cis 462 Wk 8 Assignment 2 Business Impact Analysis

...CIS 462 WK 8 ASSIGNMENT 2 BUSINESS IMPACT ANALYSIS To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-8-assignment-2-business-impact-analysis/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 462 WK 8 ASSIGNMENT 2 BUSINESS IMPACT ANALYSIS CIS 462 WK 8 Assignment 2 - Business Impact Analysis In order for an organization to develop an effective business continuity plan or disaster recovery plan, it must know what information assets it has, their impact on business operations, and the criticality and priorities associated with the information systems and assets. The primary objective of a business impact analysis (BIA) is to identify the assets that are required for continued business operations in the event of an incident or disaster. Thus, a critical step in the development of an effective BIA includes establishing component priorities and determining component reliance and dependencies. Additionally, organizational personnel must know their responsibilities during recovery efforts. Write a three to five (3-5) page paper in which you: 1. Describe the methods for establishing component priorities, including: a. Business functions and processes b. BIA scenarios and components c. Financial and service impact of components not being available d. Recovery time frameworks 2. Describe the methods for determining component reliance and dependencies, including: a. Component dependencies b. Resources required to recover component in the......

Words: 784 - Pages: 4

Cis 517 Wk 8 Assignment 4 Communication and Risk

...CIS 517 WK 8 ASSIGNMENT 4 COMMUNICATION AND RISK To purchase this visit here: http://www.activitymode.com/product/cis-517-wk-8-assignment-4-communication-and-risk/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 8 ASSIGNMENT 4 COMMUNICATION AND RISK CIS 517 WK 8 Assignment 4 - Communication and Risk In this assignment you are to submit the PowerPoint Presentation for the term paper. This is the first part of your term paper submission. Part A is a persuasive PowerPoint presentation of up to 15 slides that you will present to the Executive Committee of Fiction Corporation. Use the Notes Section of PowerPoint to give a brief overview of each slide. The PowerPoint presentation must include the following: 1. Introduction: project name, a brief description of the project, and deliverables of the project. 2. Project organization: organizational charts and project responsibilities. 3. Management and technical approaches: management objectives, Project controls, Project staffing, Technical processes. 4. Work to perform: major work packages and deliverables. More Details hidden... Activity mode aims to provide quality study notes and tutorials to the students of CIS 517 WK 8 Assignment 4 Communication and Risk in order to ace their studies. CIS 517 WK 8 ASSIGNMENT 4 COMMUNICATION AND RISK To purchase this visit here: http://www.activitymode.com/product/cis-517-wk-8-assignment-4-communication-and-risk/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 517 WK 8...

Words: 592 - Pages: 3

Cis 336 Assignment 2: Identifying Potential Risk, Response, and Recovery

...CIS 336 Assignment 2: Identifying Potential Risk, Response, and Recovery To Buy this Class Copy & paste below link in your Brower http://homeworkregency.com/downloads/cis-336-assignment-2-identifying-potential-risk-response-and-recovery/ Or Visit Our Website Visit : http://www.homeworkregency.com Email Us : homeworkregency@gmail.com CIS 336 Assignment 2: Identifying Potential Risk, Response, and Recovery Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization. After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified. Write a four to five (4-5) page paper in which you: 1. For each of the three (3) or more malicious attacks and / or threats that you...

Words: 1420 - Pages: 6

Cis 336 Assignment 2: Identifying Potential Risk, Response, and Recovery

...CIS 336 Assignment 2: Identifying Potential Risk, Response, and Recovery To Buy this Class Copy & paste below link in your Brower http://homeworkregency.com/downloads/cis-336-assignment-2-identifying-potential-risk-response-and-recovery/ Or Visit Our Website Visit : http://www.homeworkregency.com Email Us : homeworkregency@gmail.com CIS 336 Assignment 2: Identifying Potential Risk, Response, and Recovery Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization. After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified. Write a four to five (4-5) page paper in which you: 1. For each of the three (3) or more malicious attacks and / or threats that you...

Words: 1420 - Pages: 6

Cis 333 Assignment 2 Identifying Potential Risk, Response, and Recovery

...CIS 333 Assignment 2 Identifying potential risk, response, and recovery Click Link Below To Buy: http://hwcampus.com/shop/cis-333-assignment-2-identifying-potential-risk-response-recovery/ CIS 333 Week 8 Assignment 2 - Identifying Potential Risk, Response and Recovery In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization. After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified. Write a four to five (4-5) page paper in which you: 1. For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale. 2. For each of the three (3) or more malicious......

Words: 422 - Pages: 2

Cis 341 Week 8 Assignment 2

...CIS 341 Week 8 Assignment 2 Click Link Below To Buy: http://hwcampus.com/shop/cis-341-week-8-assignment-2/ Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities, you were recently hired as an Information Security Engineer for a videogame development company. After viewing a growing number of reports detailing malicious activity, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. He asked you to include a brief explanation of each item and the potential impact it could have on the organization. After review of your report, the CIO requests that you develop a follow-up plan developing a strategy for dealing with all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that will be used to mitigate each risk previously identified. Write a four to five (4-5) page paper in which you: 1. For each malicious attack and threat identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). 2. For each malicious attack and threat identified in Assignment 1, develop controls (i.e., administrative,......

Words: 466 - Pages: 2

Cis 336 Assignment 2: Identifying Potential Risk, Response, and Recovery

...CIS 336 Assignment 2: Identifying Potential Risk, Response, and Recovery To Buy this Class Copy & paste below link in your Brower http://homeworkregency.com/downloads/cis-336-assignment-2-identifying-potential-risk-response-and-recovery/ Or Visit Our Website Visit : http://www.homeworkregency.com Email Us : homeworkregency@gmail.com CIS 336 Assignment 2: Identifying Potential Risk, Response, and Recovery Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization. After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified. Write a four to five (4-5) page paper in which you: 1. For each of the three (3) or more malicious attacks and / or threats that you...

Words: 1420 - Pages: 6