Analyze the security failures

Assignment Help Management Information Sys
Reference no: EM132281239

Fundamentals of Cybersecurity

OBJECTIVE & PURPOSE:

The purpose of this assignment is to help students be able to: Analyze common security failures and identify specific design principles that have been violated (CSP3); Given a specific scenario, identify the design principles involved or needed to increase the cybersecurity posture (CSP4); and Describe appropriate measures to be taken should a system compromise occur (Business Continuity Plan) (CSF4).

DESCRIPTION OF ASSIGNMENT:

Your assignment will be to first conduct investigation using (Google, newsreport, government report, or any other valid source) into a cyber breach incident of a large company in the past several years. Then, develop a written paper that will provide a summary of the following:

•Cyber Breach Overview: Provide an overview of the cyber breach incident you are discussing in this paper and the organization that it occured in (Use references to support your claims).

•Security Failures: Analyze the security failures and identify specific design principles that have been violated during the identified cyber breach incident (Use references to support your claims).

•Cybersecurity Posture: In your own words (no quotes, but use references to support your claims) identify the design principles involved or needed to increase the cybersecurity posture in the orgenization that was breached.

•Business Continuity Plan: In your own words (no quotes, but use references to support your claims) describe appropriate measures to be taken should a system compromise occur.

•Conclusion: In your own words (no quotes!!!), provide a conclusion that summarises the whole paper.

In particular, you will need to develop a five-page document (not more!) that outlines each of the section above and provides the details to address the points above.

FORMAT:

All text in the proposal should be word-processed (letter or correspondence-quality font), New Times Roman or Calibri, 12 point, double space and standard margins. The body of the proposal should be five-pages long (not including title page, Table of Contents, & Certificate of Authorship).

The following information should also be included:

Title page:

• Project Title

• Assignment Name and Number

• Name and e-mail

• Professor's name

The report should also be done professionally and should include:

• Table of Contents (with sections & page numbers identified)

• Page numbers on all pages

• Clear and consistent headers of all sections

• Reference List following APA closely

• Certificate of Authorship - Use the certificate provided as the last page of the document!

Professional and appealing document is expected! As required by Code of Student Conduct and Academic Responsibility, please make sure to document appropriately your references and state it in your own words, or put in quotations.

Reference no: EM132281239

Questions Cloud

Making an extra payment : You have an outstanding student loan with required payments of $ 600 per month for the next four years.
Promote a product or service : Describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.
Developing examination of the financial statements : Research Coco-Cola and Pepsi on the Internet and download the Income Statement, Statement of Shareholders' Equity, Balance Sheet, and Statement of Cash Flows.
Principal of the loan : You have just taken out a $ 15 000 car loan with a 4 % APR, compounded monthly. The loan is for five years. When you make your first payment in one? month
Analyze the security failures : ISEC-615 - Fundamentals of Cybersecurity : Analyze the security failures and identify specific design principles that have been violated.
Discussion about the different types of financial statements : Think about the different types of financial statements you learned about in this unit (the income statement, statement of retained earnings, balance sheets.
What is the net advantage to leasing : Your firm is considering either leasing or buying some new equipment that belongs in a 20% CCA class. The lease payments will be $5,600 a year.
What happens to annual units demanded for the product : What happens to annual units demanded for the product if the firm increases the per-unit price from $26 to $27? From $42 to $43
Endorse the fund investment policy : Advise Minco's employees on whether to endorse the fund's investment policy.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Organizations are becoming more socially conscience

Organizations are becoming more socially conscience or less - Do you think organizations are becoming more socially conscience or less?

  How does femas infrastructure protection plan address

What do they in common? How does FEMA's Critical Infrastructure Protection Plan address key requirements set for by Clemente (2011)?

  Research the privacy and security settings on facebook

Research the privacy and security settings on Facebook and create a "User's guide" for your aunt to work through with your cousin.

  Evaluate the pros and cons in agile and waterfall project

Evaluate the pros and cons in agile and Waterfall project management in terms of planning and the execution of projects.

  Case study based on maintenance practices

A case study based on maintenance practices in the mining industry need to create individual reports/maps/trees excel based decision tree,IO Map.

  What are some disadvantages to hardware standardization

When choosing network hardware, why would it be recommended to standardize at least some types of hardware? What are some disadvantages to hardware standardization? When would you recommend hardware standardization or would you recommend it at all..

  Describes in-depth the rationale for the solution

Identify and select an incident in which you are interested. An example of an incident could be that which is acquired or occurred during hospital stays.

  Demonstrates exception handling routines

The program allows the user to reenter and input value that was invalid, until the user succeeds in entering a valid value.

  Describe steps in a process to collect digital evidence

Describe at least 5 steps in a process to collect digital evidence to the time you testify that you consider important.

  Which systems for sharing content provides version control

Which of the following systems for sharing content provides version control? During the ________ phase of the SDLC process, developers construct, test, and install the components of the information system.

  How will it be possible to keep genetic information private

Where do we draw the line on what is ethical and what is legal when it comes to our privacy? Should businesses be able to determine business outcomes based on social media? How will it be possible to keep genetic information private, what laws will b..

  What role does strategic planning play in is-it investments

What role does strategic planning play in IS/IT investments? Is this something that can be easily adjusted when necessary? Why or why not? Who is in control of the strategic planning function within an organization?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd