Responding to Memo

College
Essay
Miscellaneous
Pages 8 (2008 words)
Download 0
I'd like to begin by clarifying that there are two reasons for our susceptibility to malicious software. The first is the presence of holes and security vulnerabilities in both our operating system and our hardware. The second is the very nature of our identity as a profit-making company…

Introduction

The consequence was that the company suffered a land attack which subsequently forced our networks into a "ping of death" (Liu, Yu, and Jing, 2005). This means that the network was forced into the continued and repetitive transmission of packages which exceeded the allowable size. As you may well recall, the DoS attack paralyzed our systems and cost us in excess of $150,000.
Attacks which exploit security holes in hardware and software systems are quite common. Apart from the above described incident, the company was subjected to a second attack as a direct outcome of a security hole in its Cisco IOS router. This, the most popular corporate router, had a serious security flaw which the company only identified after the release of the router and even then did not inform users about (Zetter, 2006). Consequently, our company, just like countless others was attacked through this security hole.
In the second place, our identity renders us the target of attacks. It is unlikely that any hacker would deliberately target your daughter's computer and infect it with a Trojan Horse but where we are concerned, the issue is quite different. As a profit-making organization, we represent potentially financially lucrative information (Rhodes-Ousley, Bragg, and Strassberg, 2003). ...
Download paper
Not exactly what you need?

Related papers

Reflective Memo
Students undertaking electrical and electronics engineering can use the manual during practical lessons. The manual is simplified so that any student undertaking technical courses can follow the procedure, open a phone, identify the internal arts and repair the phone. The manual is also suitable for lecturers training engineering students. The age of the reader is about 24 years to 30 years…
Memo for Southwest Division
Memo for Southwest Division …
Interoffice Memo
I do believe that law enforcement agents can be an asset in this field of investigation where digital evidence need to be handled with care much like any physical evidence should be handled in order to be assured that evidence would not be tampered with from the time it is collected unto the time that the evidence is used in court.…
Responding to Memo
The consequence was that the company suffered a land attack which subsequently forced our networks into a "ping of death" (Liu, Yu, and Jing, 2005). This means that the network was forced into the continued and repetitive transmission of packages which exceeded the allowable size. As you may well recall, the DoS attack paralyzed our systems and cost us in excess of $150,000.…
Memo Editing
1. Making the Most of Computers. Review of computer operations and provides hands-on experience in using the company's four main software packages: word processing, spreadsheet; data-base management and graphics.…
Recommendation Memo
The gaming consoles are judged on five different criterions based on the information extracted from user reviews from cnet.com, the gaming console's respective websites and from the general public opinion and perception of the brands. The five criterions are…
Memo
I've prepared an analysis about the use of vulnerability assessment systems and intrusion detection systems in your company, just like you asked me. You specifically asked whether the use of both systems will be a waste of resources and a duplication of efforts. My analysis suggests that VAS and IDS have separate internal functions for the security of the computer systems and both must be a part…