Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:
1. 2 – Firewalls
2. 1 – Web / FTP server
3. 1 – Exchange Email server
4. 1 – Network Intrusion Detection System (NIDS)
5. 2 – Windows 2008 Active Directory Domain Controllers (DC)
6. 3 – File servers
7. 1 – Wireless access point (WAP)
8. 100 – Desktop / Laptop computers
9. VoIP telephone system
 
The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.
Write a four to five page paper in which you:
10. Analyze and assess any potential malicious attacks and threats that may be carried out against the network.
11. Illustrate in writing the potential impact of all identified malicious attacks and threats to the network and the organization.
12. Analyze and assess all potential vulnerabilities that may exist in the documented network.
13. Illustrate in writing the potential impact of all identified vulnerabilities to the network and the organization.
 
ORDER THIS ESSAY HERE NOW AND GET A DISCOUNT !!!