Cis 502 Week 8 Case Study 4 Strayer New

In: Business and Management

Submitted By activitymode
Words 553
Pages 3
CIS 502 WEEK 8 CASE STUDY 4 STRAYER NEW
To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-8-case-study-4-strayer-new/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 502 WEEK 8 CASE STUDY 4 STRAYER LATEST
Case Study 4: Remote Access Attacks
Due Week 8 and worth 100 points
TAPE LIBRARY
Remote Tape Library
BLDG 3
4-Windows PC
Ethernet
Router
Firewall
3-CISCO IDS Sensors
28-Windows PC
Ethernet
BLDG 4
30-Windows PC
Ethernet
BLDG 2
Main Bldg
10-Terminals 40 Windows PCs
ROOM 10
10-Terminals
RADIUS SERVER
Firewall
VPN Server
WEB Server
IDS Monitor
2-File Servers UNIX SYSTEM V
Ethernet
8-DISK DRIVES
4-Tape drive
System 1000
Quick Finance Company Network Diagram
Above is the Quick Finance Company network diagram. The company is a small business and does not invest much in security protection. System 1000 hosts a customer database as well as employee payroll systems. The company Web server has been defaced twice this month and the VPN server has suffered from session hijacking and Denial-of-Service (DOS) attacks twice last year. The company does not enforce a password policy and does not have a dedicated security professional.
Write a five to eight (5-8) page paper in which you:
1. Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The company does not wish to release any security related information per company policy.
2. Analyze the above case and network diagram, and describe how each access point is protected or unprotected.
3. Evaluate and describe the vulnerabilities of the Quick Finance Company’s network based on the network design.
4. Rank the top three (3) most likely network-based attacks in the order they are likely to…...

Similar Documents

Cis 502 Week 8 Case Study 4 Strayer Latest

...CIS 502 WEEK 8 CASE STUDY 4 STRAYER LATEST To purchase this visit following link: https://coursehomework.com/product/cis-502-week-8-case-study-4-strayer-latest/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 502 WEEK 8 CASE STUDY 4 STRAYER LATEST Case Study 4: Remote Access Attacks Due Week 8 and worth 100 points TAPE LIBRARY Remote Tape Library BLDG 3 4-Windows PC Ethernet Router Firewall 3-CISCO IDS Sensors 28-Windows PC Ethernet BLDG 4 30-Windows PC Ethernet BLDG 2 Main Bldg 10-Terminals 40 Windows PCs ROOM 10 10-Terminals
RADIUS SERVER Firewall VPN Server WEB Server IDS Monitor 2-File Servers UNIX SYSTEM V Ethernet 8-DISK DRIVES 4-Tape drive System 1000 Quick Finance Company Network Diagram Above is the Quick Finance Company network diagram. The company is a small business and does not invest much in security protection. System 1000 hosts a customer database as well as employee payroll systems. The company Web server has been defaced twice this month and the VPN server has suffered from session hijacking and Denial-of-Service (DOS) attacks twice last year. The company does not enforce a password policy and does not have a dedicated security professional. Write a five to eight (5-8) page paper in which you: 1. Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The......

Words: 553 - Pages: 3

Cis 502 Week 7 Case Study 3 Strayer Latest

...CIS 502 WEEK 7 CASE STUDY 3 STRAYER LATEST To purchase this visit following link: https://coursehomework.com/product/cis-502-week-7-case-study-3-strayer-latest/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 502 WEEK 7 CASE STUDY 3 STRAYER LATEST CASE STUDY 3: MOBILE DEVICES SECURITY Due Week 7 and worth 100 points The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge”, located at http://www.treasuryandrisk.com/2011/02/08/pr-mobile-device-attacks-surge, and FIPS 140-2 Security Policy, located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1648.pdf. In addition, read the report titled, “Emerging Cyber Threats 2012”, located at http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf Write a five to eight (5-8) page paper in which you: 1. Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile......

Words: 551 - Pages: 3

Cis 502 Week 4 Case Study 2 Strayer Latest

...CIS 502 WEEK 4 CASE STUDY 2 STRAYER LATEST To purchase this visit following link: https://coursehomework.com/product/cis-502-week-4-case-study-2-strayer-latest/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 502 WEEK 4 CASE STUDY 2 STRAYER LATEST Case Study 2: Social Engineering Attacks and Counterintelligence Due Week 4 and worth 100 points Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, located at http://www.voanews.com/english/news/WikiLeaks-Releases-400000-Classified-US-Military-Files- 105568738.html, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”, located at http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq- war/story?id=11949670#.TyicXlxrOQo. Write a five to eight (5-8) page paper in which you: 1. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. 2. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations......

Words: 521 - Pages: 3

Cis 502 Week 4 Case Study 2 Strayer Latest

...CIS 502 WEEK 4 CASE STUDY 2 STRAYER LATEST To purchase this visit following link: https://coursehomework.com/product/cis-502-week-4-case-study-2-strayer-latest/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 502 WEEK 4 CASE STUDY 2 STRAYER LATEST Case Study 2: Social Engineering Attacks and Counterintelligence Due Week 4 and worth 100 points Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, located at http://www.voanews.com/english/news/WikiLeaks-Releases-400000-Classified-US-Military-Files- 105568738.html, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”, located at http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq- war/story?id=11949670#.TyicXlxrOQo. Write a five to eight (5-8) page paper in which you: 1. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. 2. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations......

Words: 521 - Pages: 3

Cis 502 Week 3 Case Study 1 Strayer Latest

...CIS 502 WEEK 3 CASE STUDY 1 STRAYER LATEST To purchase this visit following link: https://coursehomework.com/product/cis-502-week-3-case-study-1-strayer-latest/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 502 WEEK 3 CASE STUDY 1 STRAYER LATEST Case Study 1: Advanced Persistent Threats Against RSA Tokens Due Week 3 and worth 100 points Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following documents: • “APT Summit Findings” located in the online course shell • “RSA Security Brief” located in the online course shell Write a five to eight (5-8) page paper in which you: 1. Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. 2. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. 3. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. 4. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. 5. Use at least three (3) quality......

Words: 463 - Pages: 2

Cis 502 Week 3 Case Study 1 Strayer New

...CIS 502 WEEK 3 CASE STUDY 1 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-3-case-study-1-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 3 CASE STUDY 1 STRAYER NEW Case Study 1: Advanced Persistent Threats Against RSA Tokens Due Week 3 and worth 100 points Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following documents: • “APT Summit Findings” located in the online course shell • “RSA Security Brief” located in the online course shell Write a five to eight (5-8) page paper in which you: 1. Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. 2. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. 3. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. 4. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. 5. Use at least three (3) quality resources...

Words: 867 - Pages: 4

Cis 502 Week 4 Case Study 2 Strayer New

...CIS 502 WEEK 4 CASE STUDY 2 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-4-case-study-2-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 4 CASE STUDY 2 STRAYER NEW Case Study 2: Social Engineering Attacks and Counterintelligence Due Week 4 and worth 100 points Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, located at http://www.voanews.com/english/news/WikiLeaks-Releases-400000-Classified-US-Military-Files- 105568738.html, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”, located at http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq- war/story?id=11949670#.TyicXlxrOQo. Write a five to eight (5-8) page paper in which you: 1. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. 2. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in......

Words: 983 - Pages: 4

Cis 502 Week 7 Case Study 3 Strayer New

...CIS 502 WEEK 7 CASE STUDY 3 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-7-case-study-3-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 7 CASE STUDY 3 STRAYER NEW CASE STUDY 3: MOBILE DEVICES SECURITY Due Week 7 and worth 100 points The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge”, located at http://www.treasuryandrisk.com/2011/02/08/pr-mobile-device-attacks-surge, and FIPS 140-2 Security Policy, located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1648.pdf. In addition, read the report titled, “Emerging Cyber Threats 2012”, located at http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf Write a five to eight (5-8) page paper in which you: 1. Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices...

Words: 1043 - Pages: 5

Cis 502 Week 3 Case Study 1 Strayer New

...CIS 502 WEEK 3 CASE STUDY 1 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-3-case-study-1-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 3 CASE STUDY 1 STRAYER NEW Case Study 1: Advanced Persistent Threats Against RSA Tokens Due Week 3 and worth 100 points Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following documents: • “APT Summit Findings” located in the online course shell • “RSA Security Brief” located in the online course shell Write a five to eight (5-8) page paper in which you: 1. Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. 2. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. 3. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. 4. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. 5. Use at least three (3) quality resources...

Words: 1300 - Pages: 6

Cis 502 Week 4 Case Study 2 Strayer New

...CIS 502 WEEK 4 CASE STUDY 2 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-4-case-study-2-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 4 CASE STUDY 2 STRAYER NEW Case Study 2: Social Engineering Attacks and Counterintelligence Due Week 4 and worth 100 points Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, located at http://www.voanews.com/english/news/WikiLeaks-Releases-400000-Classified-US-Military-Files- 105568738.html, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”, located at http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq- war/story?id=11949670#.TyicXlxrOQo. Write a five to eight (5-8) page paper in which you: 1. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. 2. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in......

Words: 1474 - Pages: 6

Cis 502 Week 7 Case Study 3 Strayer New

...CIS 502 WEEK 7 CASE STUDY 3 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-7-case-study-3-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 7 CASE STUDY 3 STRAYER NEW CASE STUDY 3: MOBILE DEVICES SECURITY Due Week 7 and worth 100 points The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge”, located at http://www.treasuryandrisk.com/2011/02/08/pr-mobile-device-attacks-surge, and FIPS 140-2 Security Policy, located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1648.pdf. In addition, read the report titled, “Emerging Cyber Threats 2012”, located at http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf Write a five to eight (5-8) page paper in which you: 1. Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices...

Words: 1564 - Pages: 7

Cis 502 Week 8 Case Study 4 Strayer New

...CIS 502 WEEK 8 CASE STUDY 4 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-8-case-study-4-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 8 CASE STUDY 4 STRAYER LATEST Case Study 4: Remote Access Attacks Due Week 8 and worth 100 points TAPE LIBRARY Remote Tape Library BLDG 3 4-Windows PC Ethernet Router Firewall 3-CISCO IDS Sensors 28-Windows PC Ethernet BLDG 4 30-Windows PC Ethernet BLDG 2 Main Bldg 10-Terminals 40 Windows PCs ROOM 10 10-Terminals
RADIUS SERVER Firewall VPN Server WEB Server IDS Monitor 2-File Servers UNIX SYSTEM V Ethernet 8-DISK DRIVES 4-Tape drive System 1000 Quick Finance Company Network Diagram Above is the Quick Finance Company network diagram. The company is a small business and does not invest much in security protection. System 1000 hosts a customer database as well as employee payroll systems. The company Web server has been defaced twice this month and the VPN server has suffered from session hijacking and Denial-of-Service (DOS) attacks twice last year. The company does not enforce a password policy and does not have a dedicated security professional. Write a five to eight (5-8) page paper in which you: 1. Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The......

Words: 1105 - Pages: 5

Cis 502 Week 9 Assignment 3 Strayer New

...CIS 502 WEEK 9 ASSIGNMENT 3 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-9-assignment-3-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 9 ASSIGNMENT 3 STRAYER LATEST Due Week 9 and worth 50 points Cybersecurity is such an important topic today and understanding its implications is paramount in the security profession. Compliance, certification, accreditation, and assessment are critical in understanding the legal and ethical procedures to follow as a security professional. In support of cybersecurity initiatives, the National Initiative for Cyber Security Education (NICE) has published several initiatives in regard to protecting national security. The following document titled, “National Initiative for Cybersecurity Education”, located at http://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce- Framework-Summary-Booklet.pdf, will be used to help you complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the National Initiative for Cyber Security Education and describe the initiative. 2. Assess the value of the NICE framework. Discuss the importance of this framework in regard to the security profession and individual organizations. 3. Suggest three (3) examples that illustrate the importance of the National Initiative for Cyber Security Education initiative. 4. Describe the expected outcomes of this initiative. 5. Evaluate how......

Words: 1845 - Pages: 8

Cis 210 Week 8 Case Study 2 Strayer

...CIS 210 WEEK 8 CASE STUDY 2 STRAYER To purchase this visit following link: https://coursehomework.com/product/cis-210-week-8-case-study-2-strayer/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 210 WEEK 8 CASE STUDY 2 STRAYER Due Week 8 and worth 50 points You have been tasked with building a payroll program for a large organization with offices spread across the United States. The company has one larger data center that each office connects to via a wide area network (WAN). Write a 3-4 page paper in which you: 1. Explain what type of architecture the new payroll application should use and why. 2. Identify what types of technology will be involved in the architecture and explain the purpose of each technology. 3. Create a graphical representation of your recommended architecture. 4. Identify and describe any potential ethical issues that could arise in connection with the new architecture. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not incCIS 210 WEEK 8 CASE STUDY 2 STRAYER To purchase this visit following......

Words: 717 - Pages: 3

Cis 210 Week 8 Case Study 2 Strayer

...CIS 210 WEEK 8 CASE STUDY 2 STRAYER To purchase this visit following link: https://coursehomework.com/product/cis-210-week-8-case-study-2-strayer/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 210 WEEK 8 CASE STUDY 2 STRAYER Due Week 8 and worth 50 points You have been tasked with building a payroll program for a large organization with offices spread across the United States. The company has one larger data center that each office connects to via a wide area network (WAN). Write a 3-4 page paper in which you: 1. Explain what type of architecture the new payroll application should use and why. 2. Identify what types of technology will be involved in the architecture and explain the purpose of each technology. 3. Create a graphical representation of your recommended architecture. 4. Identify and describe any potential ethical issues that could arise in connection with the new architecture. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not incCIS 210 WEEK 8 CASE STUDY 2 STRAYER To purchase this visit following......

Words: 717 - Pages: 3