Week-4-Idnetifying-Potential-Malicious-Attacks-Threat-Vulnerabilities

Apr 30th, 2015
Studypool Tutor
Strayer University
Course: Information Technologies
Price: $10 USD

Tutor description

In this paper we will analyze and assess any potential malicious attacks and threats that could be carried out against our client’s network, then discuss what might be the conceivable impact of all the identified malicious attacks and threats to the network and the organization. Next, we will interpret and determine what potential vulnerabilities that might exist in the documented network, and then talk about how the potential impact of all the vulnerabilities identified to the network and the organization.

Word Count: 1538
Showing Page: 1/7
Assignment 1: Identifying Potential Malicious Attacks, Threats, and VulnerabilitiesCIS 341 February 2, 2014Strayer UniversityAssignment 1: Identifying Potential Malicious Attacks, Threats, and VulnerabilitiesIn this paper we will analyze and assess any potential malicious attacks and threats that could be carried out against our clients network, then discuss what might be the conceivable impact of all the identified malicious attacks and threats to the network and the organization. Next, we will interpret and determine what potential vulnerabilities that might exist in the documented network, and then talk about how the potential impact of all the vulnerabilities identified to the network and the organization.A malicious attack on a computer or network is that someone is trying to exploit the vulnerabilities within that system. There are four general types of attacks, which are fabrications, interceptions, interruptions, and modifications. Fabrications could be that the attacker has created some type of deception as to deceive unsuspecting users into divulging sensitive information. Interceptions could involve what we call eavesdropping on transmissions and redirecting them for unwarranted use, meaning they try to listen in on Voice over Internet Protocol (VoIP) or telephone lines, then take and use that information for unlawful purposes. Interruptions is pretty much trying to interrupt the network flow of data by blocking with Denial of Service (Do

Review from student

Studypool Student
" Thanks, good work "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1826 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors