Discover Logical Attack Countermeasures
Logical attacks abuse the functionality of a program. Logical attacks can be accomplished through denial of service, queue jumping, distributed denial of service attacks, and IP spoofing. Combating logical attacks requires a new set of prevention and detection techniques.
Imagine that you are the chief information security officer (CISO) for an organization (it may help to select a specific organization with which you are familiar). You have been asked to develop a presentation for upper-level management on the key techniques to mitigate logical attacks against computers and computer networks.
For this task, you will develop a PowerPoint presentation on how the following topics can help mitigate logical attacks:
Establish and maintain an information security management system (ISMS)
Monitor and review the ISMS
Testing of solutions
Monitor IT infrastructure
Develop and implement a business continuity response
Protect against malware
Manage network and connectivity security
Monitor the infrastructure for security-related events
Effect of the influence of the organizational structures enabler (information security manager, heads of IT operations, service manager, chief security architect)
Incorporate appropriate animations, transitions, and graphics as well as speaker notes for each slide. The speaker notes may be comprised of brief paragraphs or bulleted lists.
Support your presentation with at least 12 scholarly resources. In addition to these specified resources, other appropriate scholarly resources may be included.
Keep your audience in mind. Remember you are not preparing this for an academic audience. Your audience will not care about theoretical or conceptual issues in risk management. They will only care about specific issues, strategies, and scenarios that are relevant to their organization.
Length: 12-15 slides (with a separate reference slide)
Notes Length: 200-350 words for each slide