Question: Compromising the System - Demonstration and Presentation Your presentation with the C-suite was successful. The C-suite is now leaning towards issuing you a long-term contract

Compromising the System - Demonstration and Presentation

Your presentation with the C-suite was successful. The C-suite is now leaning towards issuing you a long-term contract as their cybersecurity consultant. However, before they do that, they want to evaluate your defense strategy skills. You are now asked to demonstrate, using the LopesCloud environment, how you will mitigate, counteract, and strengthen the organization against cyberattacks.

Create an 8-10-slide presentation that addresses the following, while integrating Christian ethics to drive ethical responsibilities and moral principles in your approach:

1. Diagram a basic network architecture given a specific need and set of hosts/clients. Include network defensive measures such as DMZs, firewalls, proxy servers, and IDS/IPS. Consider the various types of attacks to defend against (brute force, chosen plaintext, known plaintext, differential and linear cryptanalysis, etc.).

2. Using the Kali VM and Nmap, identify the IP of your targets, any open ports and services running on the targets, and the operating system. Document your findings.

3. Research at least three vulnerabilities on the targets that can be exploited. Document your research. Counteract by neutralizing or repelling the attacks and describe common network vulnerabilities and vulnerability scanning to include buffer overflows, privilege escalation, and rootkits.

4. Describe how to implement network defense measures to prevent network attacks by applying the knowledge of a network monitoring tool or a network mapping tool from steps 2 and 3 above. Explain implementation failures. Would adopting virtualization/containers reduce failures? How?

5. Analyze common security failures and identify specific design principles that have been violated. Describe how ethical decision making and a commitment to excellence can prevent or mitigate these failures.

6. As you know, social engineering continues to be a primary attack vector in any organization. Identify techniques employees, vendors, and customers can employ to help prevent social engineering attacks in the organization. Explain how the role of ethical education and awareness in fostering a culture of security with the organization, influenced by Christian values of honesty and integrity. 7. Explain the circumstances under which a vulnerability must be disclosed to an organization. Reflect on the ethical responsibility to disclose vulnerabilities promptly and transparently, ensuring that all actions prioritize the well-being of stakeholders and align with Christian moral principles. While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!