preview

I am hired as an Information Security Engineer for a videogame development company. The

Decent Essays

I am hired as an Information Security Engineer for a videogame development company. The organization network structure is given in the diagram. I was notified that malicious activities are taking place in the network structure. They can effect protection of the intellectual property and highly sensitive data maintained by the organization. I am assigned to resolve these issues that arise in the network structure. In this document I will analyze and assess potential malicious attacks and threats that may be carried out against the network along with potential vulnerabilities that may exist in the documented network. Also I will tell the potential impact of all malicious attacks & threats and identified vulnerabilities to the network and …show more content…

In a hijack attack, a hacker can destroy the connection between two parties and get hold on it. Victim still assumes that he is talking to original party and can send him your important data. In a spoof attack, the hacker modifies the source address of the packets he or she is sending so that they appear to be coming from someone else. This may be an attempt to bypass your firewall rules. In a buffer overflow attacker gains administrative access to the system and he can modify or remove anything he wants. In this type of attack, the attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability.
In password attack hacker crack the password which can be stored anywhere in the network whether in protected file or database. All these above mentioned attacks and threats can be malicious to Videogame Development Company. These can impact network structure badly. Lack of Appliance of SSL (Secure Socket Layer) technology can perform security threats and malicious attacks and for network it will be a negative impact. There will be also a negative impact, if system do not uses close system (Firewall), which provides services until network devices are switched on (1). Attackers attack the network by identifying a weak point in the network and create a network threat. There are four primary classes of threat: Unstructured Threats, Structured Threats, External threats and internal

Get Access