Got a tricky question? Receive an answer from students like you! Try us!

Responding to Memo - Essay Example

Only on StudentShare
Author : mauricio10

Summary

I'd like to begin by clarifying that there are two reasons for our susceptibility to malicious software. The first is the presence of holes and security vulnerabilities in both our operating system and our hardware. The second is the very nature of our identity as a profit-making company…

Extract of sample
Responding to Memo

The consequence was that the company suffered a land attack which subsequently forced our networks into a "ping of death" (Liu, Yu, and Jing, 2005). This means that the network was forced into the continued and repetitive transmission of packages which exceeded the allowable size. As you may well recall, the DoS attack paralyzed our systems and cost us in excess of $150,000.
Attacks which exploit security holes in hardware and software systems are quite common. Apart from the above described incident, the company was subjected to a second attack as a direct outcome of a security hole in its Cisco IOS router. This, the most popular corporate router, had a serious security flaw which the company only identified after the release of the router and even then did not inform users about (Zetter, 2006). Consequently, our company, just like countless others was attacked through this security hole.
In the second place, our identity renders us the target of attacks. It is unlikely that any hacker would deliberately target your daughter's computer and infect it with a Trojan Horse but where we are concerned, the issue is quite different. As a profit-making organization, we represent potentially financially lucrative information (Rhodes-Ousley, Bragg, and Strassberg, 2003). ...
Download paper

Related Essays

Interoffice Memo
I do believe that law enforcement agents can be an asset in this field of investigation where digital evidence need to be handled with care much like any physical evidence should be handled in order to be assured that evidence would not be tampered with from the time it is collected unto the time that the evidence is used in court.…
8 pages (2008 words)
Memo Editing
1. Making the Most of Computers. Review of computer operations and provides hands-on experience in using the company's four main software packages: word processing, spreadsheet; data-base management and graphics.…
4 pages (1004 words)
Recommendation Memo
The gaming consoles are judged on five different criterions based on the information extracted from user reviews from cnet.com, the gaming console's respective websites and from the general public opinion and perception of the brands. The five criterions are…
4 pages (1004 words)
Memo
I've prepared an analysis about the use of vulnerability assessment systems and intrusion detection systems in your company, just like you asked me. You specifically asked whether the use of both systems will be a waste of resources and a duplication of efforts. My analysis suggests that VAS and IDS have separate internal functions for the security of the computer systems and both must be a part of a computer system for complete security control.…
8 pages (2008 words)
videocy findings memo
The aforementioned can be achieved through the implementation of the following advice:…
4 pages (1004 words)
Memo
4. A super regulation agency must watch over all others. This might mean removing excess or smaller regulatory agencies that have redundant work. A third party organization should oversee and contribute to that agency.…
1 pages (251 words)
Memo
It does not only assist the user is using it with Television set, it even helps the user in using the product with different systems such as computer system. For example: on page 9, 10 and 11, the guide writer not only clearly informs the audience about the wires that come with the audio system, he/she even informs the audience about which wire will be used for what purpose.…
1 pages (251 words)