Identifying Potential Malicious Attacks, Threats, and Vulnerabilities As a videogame development company, the network currently set is a sound system. However, security concerns are always present in an ever-changing technology. With 100 desktop / laptop computers connected to one server the potential threats and malicious attacks are a possibility. This report will analyze, identified and assess the potential impact of all vulnerabilities and malicious attacks and threats associated with the network. A threat is any action that could result in damage to the company’s asset, in this case, the network. For network computer threats can be malicious codes, viruses and …show more content…
By identifying the vulnerabilities and potential attacks we can mitigate the risks to minimal. The recommendations stated above will improve our security and by continuous monitoring and updating we will keep the attacks to acceptable level. Our defined acceptable level should be no leakage from our company’s sensitive data.
Burton, K. (2013, Jan 20). The Conficker worm. Retrieved from SANS Network: http://www.sans.org/security-resources/malwarefaq/conficker-worm.php
Frankk, D. (2012, May 25). Important Security Issues in Wireless Networks. Retrieved from Examiner.com: http://www.examiner.com/article/security-issues-wireless-networks
Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems Security. Burlington: Jones & Bartlett Learning.
Manky, D. (2010, November 8). Top 10 vulnerabilities inside the network. Retrieved from NetworkWorld: http://www.networkworld.com/news/tech/2010/110810-network-vulnerabilities.html?page=1
Wyman, B., Scrivens, W., Hoffman, P., & Spitzner, L. (2013, Feb 01). Email Phishing Attacks. Retrieved from SANS Institute: