week five assitance

PART 1

Legitimate users of the Human Resources (HR) department have been prevented from using resources available on some of their servers by an attack that flooded excessive network traffic to the servers. The loss of services resulted in email and web connectivity. The attack affected both internal and external users, which led to loss of reputation of the organization. The head of the HR department has requested that you write an email to HR employees and copy the Chief Ethics and compliance Officer and Chief Executive Officer to explain the attack.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Your email should vividly describe the attack and be understood by the intended recipients. Therefore the email should address:

  1. The meaning of a denial of service (DoS) or a distributed denial of service (DDoS) attack
  2. Indications of DoS/DDoS attacks
  3. The types of DoS/DDoS attacks
  4. The techniques you will use to detect DoS/DDoS attacks
  5. The challenges encounter in investigating DoS/DDoS attacks
  6. Tools that you will use to investigate the attacks
  7. Mitigation strategies for DoS/DDoS attacks

Keep your audience in mind when crafting this email. Do not mention theories or concepts that are not directly applicable to this specific situation. Support your email with a minimum of two (2) recent (within the past five years) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

Length: Minimum of 500 words.

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.

PART 2

Bottom of Form

Web servers host data and other content available to customers on the Internet and are often the most targeted and attacked components of a company’s network. Therefore, website security is more important than ever. Many customers consider website security a top consideration when they choose to shop online. As a result, it is essential to secure servers and the network infrastructure that supports them. The consequences of a security breach are great: loss of revenues, damage to credibility, legal liability and loss of customer trust. Cyber criminals may exploit software bugs in the web server, underlying operating system, or active content to gain unauthorized access to the web server. Cyber criminals can cause denial-of-service attacks, read and modified unencrypted sensitive information and use web servers as a distribution point for attack tools, pornography or illegally copied software.

Multiple risk assessment frameworks existed. Some risk assessments are specific to a particular country or region while some are universal. Choose one of the risk assessment frameworks that can address the cyber threats and attacks on web servers. Write a blog of 5-7 pages including images and diagrams to support the risk assessment framework that you have selected.

In your blog, address the following:

  1. An introductory section on risk management and risks in general
    Types of risk
    1. Strategic – Goals of the Organization
    2. Operational – Processes that Achieve Goals
    3. Financial – Safeguarding Assets
    4. Compliance – Laws and Regulations
    5. Reputational – Public Image
  2. Functions of web servers
  3. Cyber-attacks on web servers (explain at least 5)
  4. Risk Assessment Framework
    1. What is the framework?
    2. How does it address attacks on web server
    3. The framework recommended mitigation strategies on web server attacks
    4. Explain the dependencies the framework has with other frameworks

Length: 5-7 pages

Blogs must be effectively designed by you to meet the following criteria:

  1. Locate your blog at a website that can be easily accessed by the course instructor (Hint: Use a free website such as www.wordpress.com , www.blogster.com, or www.blog.com).
  2. Use a font that is readable (e.g., appropriate size and type, contrasts with background, and contains sufficient white space).
  3. Include information that supports the assignment criteria listed above.
  4. Make sure all of the links work.
  5. Include at least one graphic.
  6. Use the same template throughout with a consistent design and format.
  7. Keep your audience in mind when composing your blog.

Your blog should include a minimum of five (5) sources. It should demonstrate thoughtful consideration of the ideas and concepts presented in the course by providing new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards where appropriate.