Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center. Instructors, training on how to grade is within the Instructor Center. Due Week 4 and worth 75 points You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization. Write a four to five (4-5) page paper in which you: Your assignment must follow these formatting requirements: The specific course learning outcomes associated with this assignment are: Purchase the answer to view it Purchase the answer to view it Purchase the answer to view it

As an Information Security Engineer, it is crucial to identify and address potential malicious attacks, threats, and vulnerabilities that could impact the organization. In order to fulfill the request of the CIO, a comprehensive report needs to be drafted.

One potential malicious attack that the organization should be aware of is a Distributed Denial of Service (DDoS) attack. This type of attack involves overwhelming a targeted server or website with a flood of internet traffic, making it inaccessible to legitimate users. The impact of a successful DDoS attack could include loss of revenue, reputation damage, and disruption of services.

Another potential threat to consider is social engineering. Social engineering involves manipulating individuals to gain sensitive information or access to systems. For example, an attacker may pose as a trustworthy person and convince an employee to provide login credentials. If successful, the attacker could gain unauthorized access to sensitive data, compromising the organization’s security.

In terms of vulnerabilities, one to note is outdated software or operating systems. If the organization fails to apply patches and updates regularly, it becomes susceptible to known vulnerabilities that could be exploited by attackers. The potential impact of exploiting such vulnerabilities includes unauthorized access, data breaches, and the installation of malware.

Additionally, weak or easily guessable passwords are a significant vulnerability. Employees who use weak passwords can be an easy target for attackers attempting to gain unauthorized access. This can lead to unauthorized data access or even compromise of the entire network. Therefore, it is important for the organization to enforce strong password policies and provide training on password best practices.

Furthermore, inadequate network segmentation can leave the organization vulnerable to attacks. Without proper segmentation, if one part of the network is compromised, the attacker may be able to move laterally and gain access to other critical areas. This could result in unauthorized access to sensitive data and compromise the overall security of the organization.

In conclusion, it is crucial for the organization to be aware of potential malicious attacks, threats, and vulnerabilities. By understanding these risks, appropriate measures can be implemented to mitigate their impact. By addressing issues such as DDoS attacks, social engineering, outdated software, weak passwords, and inadequate network segmentation, the organization can enhance its overall security posture.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer