Current Attack Vectors and Secure Network Design

Dec 7th, 2015
HelloWorld
Category:
Computer Science
Price: $100 USD

Question description

A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 employees within the next 18 months and is preparing to build his systems infrastructure across three (3) locations: one (1) primary headquarters and two (2) small satellite offices. All three (3) locations will occupy one (1) entire floor of a multitenant building. Your friend has asked your opinion regarding major technology choices that he must make for his business, such as operating systems, mobile devices, cloud services, and wireless networking.

Write a six to ten (6-10) page paper in which you:

  1. Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.
  2. Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause. 
  3. Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.
  4. Consider the use of cloud providers to allow for access to data for employees and potential clients. Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.
  5. Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.
  6. Recommend the minimum physical and technical controls for protecting the company’s intellectual property from both internal and external threats. Provide a rationale for your response.
  7. Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.
  8. Design a floor plan of each of the three (3) offices. Include locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Use the graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 
  9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Discuss the concepts of ethical hacking, different types of hacking, and penetration testing techniques.
  • Explain and apply various hacking technologies and features that administrators deploy to protect their networks. 
  • Review system (Linux and Mac OS X) and networking device hacking techniques and vulnerabilities.
  • Summarize wired and wireless networking devices and standards, including routers, cables, firewalls and access points, as well as the methods of hacking.
  • Explain physical security and its associated challenges.
  • Use technology and information resources to research issues in ethical hacking.
  • Write clearly and concisely about topics related to Perimeter Defense Techniques using proper writing mechanics and technical style conventions.

Term Paper: Current Attack Vectors and Secure Network Design

Criteria

Unacceptable

Below 60% F

Meets Minimum Expectations

60-69% D

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1. Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.

Weight: 10%

Did not submit or incompletely analyzed the security features of Linux, Macintosh, and Windows operating systems, and did not submit or incompletely decided which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Did not submit or incompletely justified your response.

Insufficiently analyzed the security features of Linux, Macintosh, and Windows operating systems, and insufficiently decided which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Insufficiently justified your response.

Partially analyzed the security features of Linux, Macintosh, and Windows operating systems, and partially decided which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Partially justified your response.

Satisfactorily analyzed the security features of Linux, Macintosh, and Windows operating systems, and satisfactorily decided which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Satisfactorily justified your response.

Thoroughly analyzed the security features of Linux, Macintosh, and Windows operating systems, and thoroughly decided which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Thoroughly justified your response.

2. Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.
Weight: 10%

Did not submit or incompletely discussed the primary security concerns surrounding USB and other portable devices, and did not submit or incompletely prioritized the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

Insufficiently discussed the primary security concerns surrounding USB and other portable devices, and insufficiently prioritized the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

Partially discussed the primary security concerns surrounding USB and other portable devices, and partially prioritized the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

Satisfactorily discussed the primary security concerns surrounding USB and other portable devices, and satisfactorily prioritized the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

Thoroughly discussed the primary security concerns surrounding USB and other portable devices, and thoroughly prioritized the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

3. Take a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Suggest the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Justify your response.

Weight: 10%

Did not submit or incompletely took a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Did not submit or incompletely suggested the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Did not submit or incompletely justified your response.

Insufficiently took a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Insufficiently suggested the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Insufficiently justified your response.

Partially took a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Partially suggested the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Partially justified your response.

Satisfactorily took a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Satisfactorily suggested the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Satisfactorily justified your response.

Thoroughly took a position on whether you believe a network with wireless access points and clients, or a predominantly wired network, is more susceptible to a network attack. Thoroughly suggested the tools that you would use to penetrate a wireless network in comparison to a network without wireless access points. Thoroughly justified your response.

4. Consider the use of cloud providers to allow for access to data for employees and potential clients. Examine the general security concerns for cloud-based solutions, and validate whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

Weight: 10%

Did not submit or incompletely considered the use of cloud providers to allow for access to data for employees and potential clients. Did not submit or incompletely examined the general security concerns for cloud-based solutions, and did not submit or incompletely validated whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

Insufficiently considered the use of cloud providers to allow for access to data for employees and potential clients. Insufficiently examined the general security concerns for cloud-based solutions, and insufficiently validated whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

Partially considered the use of cloud providers to allow for access to data for employees and potential clients. Partially examined the general security concerns for cloud-based solutions, and partially validated whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

Satisfactorily considered the use of cloud providers to allow for access to data for employees and potential clients. Satisfactorily examined the general security concerns for cloud-based solutions, and satisfactorily validated whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

Thoroughly considered the use of cloud providers to allow for access to data for employees and potential clients. Thoroughly examined the general security concerns for cloud-based solutions, and thoroughly validated whether or not you would consider the use of a cloud provider an optimal solution for this scenario.

5. Describe what you believe to be the most effective attack against mobile computing devices, and choose one (1) tool that a hacker could use to carry out this attack. Support your response with related examples of the chosen tool in use.

Weight: 10%

Did not submit or incompletely described what you believe to be the most effective attack against mobile computing devices, and did not submit or incompletely chose one (1) tool that a hacker could use to carry out this attack. Did not submit or incompletely supported your response with related examples of the chosen tool in use.

Insufficiently described what you believe to be the most effective attack against mobile computing devices, and insufficiently chose one (1) tool that a hacker could use to carry out this attack. Insufficiently supported your response with related examples of the chosen tool in use.

Partially described what you believe to be the most effective attack against mobile computing devices, and partially chose one (1) tool that a hacker could use to carry out this attack. Partially supported your response with related examples of the chosen tool in use.

Satisfactorily described what you believe to be the most effective attack against mobile computing devices, and satisfactorily chose one (1) tool that a hacker could use to carry out this attack. Satisfactorily supported your response with related examples of the chosen tool in use.

Thoroughly described what you believe to be the most effective attack against mobile computing devices, and thoroughly chose one (1) tool that a hacker could use to carry out this attack. Thoroughly supported your response with related examples of the chosen tool in use.

6. Recommend the minimum physical and technical controls for protecting the company’s intellectual property from both internal and external threats. Provide a rationale for your response.

Weight: 10%

Did not submit or incompletely recommended the minimum physical and technical controls for protecting the company’s intellectual property from both internal and external threats. Did not submit or incompletely provided a rationale for your response.

Insufficiently recommended the minimum physical and technical controls for protecting the company’s intellectual property from both internal and external threats. Insufficiently provided a rationale for your response.

Partially recommended the minimum physical and technical controls for protecting the company’s intellectual property from both internal and external threats. Partially provided a rationale for your response.

Satisfactorily recommended the minimum physical and technical controls for protecting the company’s intellectual property from both internal and external threats. Satisfactorily provided a rationale for your response.

Thoroughly recommended the minimum physical and technical controls for protecting the company’s intellectual property from both internal and external threats. Thoroughly provided a rationale for your response.

7. Consider the tools explored throughout the course, and suggest what you believe to be the three (3) most useful tools for a hacker to utilize. Justify your response.

Weight: 10%

Did not submit or incompletely considered the tools explored throughout the course, and did not submit or incompletely suggested what you believe to be the three (3) most useful tools for a hacker to utilize. Did not submit or incompletely justified your response.

Insufficiently considered the tools explored throughout the course, and insufficiently suggested what you believe to be the three (3) most useful tools for a hacker to utilize. Insufficiently justified your response.

Partially considered the tools explored throughout the course, and partially suggested what you believe to be the three (3) most useful tools for a hacker to utilize. Partially justified your response.

Satisfactorily considered the tools explored throughout the course, and satisfactorily suggested what you believe to be the three (3) most useful tools for a hacker to utilize. Satisfactorily justified your response.

Thoroughly considered the tools explored throughout the course, and Thoroughly suggested what you believe to be the three (3) most useful tools for a hacker to utilize. Thoroughly justified your response.

8. Design a floor plan of each of the three (3) offices. Include locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Use the graphical tools in Microsoft Visio or an open source alternative such as Dia.

Weight: 15%

Did not submit or incompletely designed a floor plan of each of the three (3) offices. Did not submit or incompletely included locations of data center(s), telecommunication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Did not submit or incompletely used the graphical tools in Microsoft Visio or an open source alternative such as Dia.

Insufficiently designed a floor plan of each of the three (3) offices. Insufficiently included locations of data center(s), tele-communication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Insufficiently used the graphical tools in Microsoft Visio or an open source alternative such as Dia.

Partially designed a floor plan of each of the three (3) offices. Partially included locations of data center(s), tele-communication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Partially used the graphical tools in Microsoft Visio or an open source alternative such as Dia.

Satisfactorily designed a floor plan of each of the three (3) offices. Satisfactorily included locations of data center(s), tele-communication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Satisfactorily used the graphical tools in Microsoft Visio or an open source alternative such as Dia.

Thoroughly designed a floor plan of each of the three (3) offices. Thoroughly included locations of data center(s), tele-communication closet(s), end-user areas, conference rooms, networking equipment, security controls, etc. Thoroughly used the graphical tools in Microsoft Visio or an open source alternative such as Dia.

9. 3 references

Weight: 5%

No references provided

Does not meet the required number of references; all references poor quality choices.

Does not meet the required number of references; some references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

10. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 8 errors present

7-8 errors present

5-6 errors present

3-4 errors present

0-2 errors present


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: Boston College
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
Five Star Tutor
Dec 4th, 2016
" Outstanding Job!!!! "
kpcutie
Nov 20th, 2016
" Excellent job "
Joemoe
Nov 11th, 2016
" <3 it, thanks for saving me time. "
Hemapathy
Nov 7th, 2016
" all I can say is wow very fast work, great work thanks "
pmallory
Oct 29th, 2016
" Totally impressed with results!! :-) "
kevin12622
Oct 15th, 2016
" Goes above and beyond expectations ! "
kiln82
Oct 6th, 2016
" awesome work thanks "
likeplum4
Sep 23rd, 2016
" Excellent work as usual "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1822 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors