Analyze the security failures

Assignment Help Management Information Sys
Reference no: EM132281239

Fundamentals of Cybersecurity

OBJECTIVE & PURPOSE:

The purpose of this assignment is to help students be able to: Analyze common security failures and identify specific design principles that have been violated (CSP3); Given a specific scenario, identify the design principles involved or needed to increase the cybersecurity posture (CSP4); and Describe appropriate measures to be taken should a system compromise occur (Business Continuity Plan) (CSF4).

DESCRIPTION OF ASSIGNMENT:

Your assignment will be to first conduct investigation using (Google, newsreport, government report, or any other valid source) into a cyber breach incident of a large company in the past several years. Then, develop a written paper that will provide a summary of the following:

•Cyber Breach Overview: Provide an overview of the cyber breach incident you are discussing in this paper and the organization that it occured in (Use references to support your claims).

•Security Failures: Analyze the security failures and identify specific design principles that have been violated during the identified cyber breach incident (Use references to support your claims).

•Cybersecurity Posture: In your own words (no quotes, but use references to support your claims) identify the design principles involved or needed to increase the cybersecurity posture in the orgenization that was breached.

•Business Continuity Plan: In your own words (no quotes, but use references to support your claims) describe appropriate measures to be taken should a system compromise occur.

•Conclusion: In your own words (no quotes!!!), provide a conclusion that summarises the whole paper.

In particular, you will need to develop a five-page document (not more!) that outlines each of the section above and provides the details to address the points above.

FORMAT:

All text in the proposal should be word-processed (letter or correspondence-quality font), New Times Roman or Calibri, 12 point, double space and standard margins. The body of the proposal should be five-pages long (not including title page, Table of Contents, & Certificate of Authorship).

The following information should also be included:

Title page:

• Project Title

• Assignment Name and Number

• Name and e-mail

• Professor's name

The report should also be done professionally and should include:

• Table of Contents (with sections & page numbers identified)

• Page numbers on all pages

• Clear and consistent headers of all sections

• Reference List following APA closely

• Certificate of Authorship - Use the certificate provided as the last page of the document!

Professional and appealing document is expected! As required by Code of Student Conduct and Academic Responsibility, please make sure to document appropriately your references and state it in your own words, or put in quotations.

Reference no: EM132281239

Do you agree with the widely-accepted thought that family

The cause of a patient's health can be very closely related to their individual attributes. For example, a person with a family history of high blood pressure or mental illn

Critically discuss the success of cloud-based applications

MANAGEMENT INFORMATION SYSTEMS - In your opinion, which mobile services provider, from the above case has the competitive advantage in 2015? Justify your answer, using releva

Explain the general trend and trends within two subsets

Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas o

Provide a summary of what amazon web services offers

Provide a summary of what Amazon Web Services offers? This may require research outside of the article. List the advantages and disadvantages Airbnb has experienced using

Discuss another challenge that pertain to conflicts in nclds

From the e-Activity, Amore's and Quesada's article discusses the challenges of incorporating Natural Command Language Dialogs (NCLDs) into a phone system. One challenge pert

Explain the current practice among federal

Describe five applicable federal, state, and local laws, regulations, or statutes that relate to cybersecurity - Analyze the objectives and challenges of enforcing federal sta

How will your team identify potential digital evidence

Describe your plan for processing the potential crime/incident scene. Some of the items you will want to cover include (not all inclusive): How will your team identify potenti

Examine the influence of web-based information

Examine the influence of web-based information on global citizenship and multicultural understanding. Then, compile a list of three factors you believe should be considered

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd