StudentShare solutions
Got a tricky question? Receive an answer from students like you! Try us!

Essay example - Responding to Memo

Only on StudentShare
Pages 8 (2008 words)
I'd like to begin by clarifying that there are two reasons for our susceptibility to malicious software. The first is the presence of holes and security vulnerabilities in both our operating system and our hardware. The second is the very nature of our identity as a profit-making company…

Extract of sample

The consequence was that the company suffered a land attack which subsequently forced our networks into a "ping of death" (Liu, Yu, and Jing, 2005). This means that the network was forced into the continued and repetitive transmission of packages which exceeded the allowable size. As you may well recall, the DoS attack paralyzed our systems and cost us in excess of $150,000.
Attacks which exploit security holes in hardware and software systems are quite common. Apart from the above described incident, the company was subjected to a second attack as a direct outcome of a security hole in its Cisco IOS router. This, the most popular corporate router, had a serious security flaw which the company only identified after the release of the router and even then did not inform users about (Zetter, 2006). Consequently, our company, just like countless others was attacked through this security hole.
In the second place, our identity renders us the target of attacks. It is unlikely that any hacker would deliberately target your daughter's computer and infect it with a Trojan Horse but where we are concerned, the issue is quite different. As a profit-making organization, we represent potentially financially lucrative information (Rhodes-Ousley, Bragg, and Strassberg, 2003). ...
Download paper
Not exactly what you need?

Related papers

Reflective Memo
Students undertaking electrical and electronics engineering can use the manual during practical lessons. The manual is simplified so that any student undertaking technical courses can follow the procedure, open a phone, identify the internal arts and repair the phone. The manual is also suitable for lecturers training engineering students. The age of the reader is about 24 years to 30 years…
2 pages (502 words)
Memo for Southwest Division
Memo for Southwest Division …
1 pages (251 words)
Interoffice Memo
I do believe that law enforcement agents can be an asset in this field of investigation where digital evidence need to be handled with care much like any physical evidence should be handled in order to be assured that evidence would not be tampered with from the time it is collected unto the time that the evidence is used in court.…
8 pages (2008 words)
Memo Editing
1. Making the Most of Computers. Review of computer operations and provides hands-on experience in using the company's four main software packages: word processing, spreadsheet; data-base management and graphics.…
4 pages (1004 words)
Recommendation Memo
The gaming consoles are judged on five different criterions based on the information extracted from user reviews from, the gaming console's respective websites and from the general public opinion and perception of the brands. The five criterions are…
4 pages (1004 words)
I've prepared an analysis about the use of vulnerability assessment systems and intrusion detection systems in your company, just like you asked me. You specifically asked whether the use of both systems will be a waste of resources and a duplication of efforts. My analysis suggests that VAS and IDS have separate internal functions for the security of the computer systems and both must be a part…
8 pages (2008 words)