Coronavirus made it tough but we keep working remotely with no delays. Get 15% OFF your First Order
Get 15% OFF your First Order

Programming

Qualitative Analysis

I’m trying to learn for my Computer Science class and I’m stuck. Can you help?

For this assignment, you will need to perform a qualitative analysis on the below scenario. Please write your response in a spreadsheet.

Qualitative Analysis

For this part of the assignment, you can use the work you performed for last week. Take those 7 risks and arrange them into a spreadsheet. Perform a probability assessment and write about the impact of the risk for each of the 7, based on the geographical location of last week’s assignment. Use the following format:

Category

Probability (0.0-1.0)

Impact (0-100)

Risk Level (P x I)

Description

Zombies

.02

90

1.8

Zombie Apocalypse causes wide spread panic and physical security threats to staff, property and business operations.

Minimum 2 peer reviewed articles as reference:

Last week’s assignment details to refer:

I have selected Trozzolo Communications Group; a marketing communication firm focused on inspiring consumers with a sense of urgency without advertising or process biases. In every marketing practice, the Organization provides top-shelf talent for customers.

The User Domain

The Trozzolo Communications Group consists of people who usually know so little about attackers’ tricks. The agency networks have generally strong passwords that you need to remember to access the internet. Attackers may, however, persuade people to share personal data such as passwords in addition to other forms of private information. Through supplying this knowledge, computer viruses and social engineers’ infections can be induced. The activities performed by individuals on the computer provide a vulnerability for the user domain to be susceptible to attackers (Kim et al, 2012). A worst-case scenario here can occur when an invite to hack the system from the user domain is accepted when he user access unsafe sites, download malicious files and run compromised programmers. Furthermore, it can corrupt an entire computer network by injecting corrupted jump drives into machines. Mitigations to this would require users to be restricted from accessing certain services by the administrator level.

The Workstation Domain

If action is not taken to prevent the agency’s workstation updated, malware will infect a computer. There is no guarantee that the device can defend itself from malicious software by installing security updates on the workstation. The lack of an antivirus application can also lead to malware being infected on the computer. Malware can impact not only one device, but it can also attack the entire network. If a device has an antivirus program, it needs to update its meanings precisely because there may be new malware (Johnson, 2012).

Generally, Trozzolo Communications Group does not approve for most employees to be able to install apps. Administrative IDs that authorize interface modifications, but they may be split between those workers assigned to install the software and their corresponding passwords. It is also feasible and more robust to have advanced third party solution. As changes to the workforce take place, shared identities tend to require improvement of common passwords. The text provides a list of roles within this area which may include a suitable regulation. The possibility that the workstation is corrupted with ransomware can be significantly reduced by an anti-virus system regularly updated.

The LAN Domain

There is a field called the LAN domain inside the firewall. The LAN domain may entail of many interconnected computers or some connected PCs. If the LAN domain is not secured, attackers can easily access the network (Johnston et al. 2004). The computer systems are linked to each other via junctions, switches and routers. Hubs-connected computer systems tend to fend out threats. Switches that link devices will reduce the chances of attacks by sniffing.

The worst scenario that can happen in this domain is a malware injected by an attacker spreading through the LAN network and into all workstations. This would breach the integrity of data, making it accessible to the wrong hands and vulnerable to exposure and misuse, consequently costing the agency and their clients (Johnston et al. 2004). A mitigation solution to this is integrating strict firewall rules. A secure Firewall will monitor traffic into and out of our network as well as tracking data packets. The agency policy will ignore the traffic it chooses to be harmful to a network or computer, depending on their system administrator’s firewall guidelines. Firewall laws are like control limits on packets that flow across, though, or out of a network.

The LAN-WAN Domain

The LAN domain, as well as the WAN domain, are connected to the so-called LAN-to-WAN domain. The considerably secure area is the LAN domain, while the WAN forms the weak area. Strict protection is, therefore, necessary to prevent attacks by the system. When high-security measures are not taken, security risks are guaranteed to happen. Strict security prohibits hackers from accessing information and sensitive information.

For the agency, the protected area is the LAN domain where less the WAN is the domain with most vulnerability. Consequently, stringent security is needed to prevent device attacks. If high-security measures are not taken, there are security risks. High security prohibits hackers from manipulating confidential information. For the company, a worst-case scenario to the LAN which results in easy attacks on the WAN. As a mitigation measure, strict security is required to prevent device attacks. When high-security measures are not taken, there must be safety risks.

The Remote Access Domain

The agency’s VPN link requires Remote Access. Since VPN links use the network, remote access domains are intended for the attackers because there are malicious attackers on the Web. The vulnerability of the VPN connection weakens remote access domains. Data sent via the Internet must be protected in order to stop attackers from getting entrance to the remote access domain. Worst case scenario is if the data remains unprotected, attackers may attack the system. A prevention strategy is to apply intrusion detection as well as prevention software.

WAN Domain

The WAN is the Network for most enterprises rather than the LAN. In light of this condition, maintaining safety on all systems for two reasons is very important for companies. The WAN is a distrustful area first of all (Johnston et al. 2004). The Internet, secondly, is also an untrusted hacker environment. It is therefore highly recommended that companies maintain strong security in all systems to prevent attackers from accessing the network.

System/Application Domain

The System/Application Domain is, last but not least, comprised of servers to be covered. A number of steps must be taken to ensure that criminals do not gain access to the system/application environment. One could be that the agency can disable all non-use facilities and protocols. Additionally, their admins can create new passwords and perform updates on the server system. Finally, they should also turn the firewalls green.

Looking for this or a Similar Assignment? Click below to Place your Order

× How can I help you?