How situation would be handled and what steps to begin with

Assignment Help Computer Network Security
Reference no: EM131308417

Module Case Study

The purpose of this assignment is for students to write a case study based on a common information security scenario.

Prompt: You are the senior information security manager for a federal agency. You received a phone call from an employee stating that his laptop was stolen from his workstation. He tells you that the laptop has at least 20 cases with Social Security numbers of individuals he has been assisting. How would you handle this security incident? What is the first thing you should do? How would you retrieve/destroy the data? You may have an internal thief-what would you do to find out who stole the laptop? What security violations have been committed? How would you prevent this from happening again? Write a report summarizing the issue and addressing all questions.

Specifically, the following critical elements must be addressed:

- Discuss how the situation would be handled and what steps to begin with.
- Examine how data would be retrieved and/or destroyed.
- Address what steps would be taken to determine the culprit.
- Name what security violations have been committed.
- Determine what steps could be taken in order to prevent this from happening again.

Guidelines for Submission: Your paper must be submitted as a two-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins.

Reference no: EM131308417

Questions Cloud

Internal rate of return exceeds the required return : Which one of the following statements is correct in relation to independent projects? The internal rate of return cannot be used to determine the acceptability of a project that has financing type cash flows. A project with investing type cash flows ..
Write program that prompts the user to enter a phone number : Write a test program that prompts the user to enter a phone number as a string. The input number may contain letters. The program translates a letter (upper- or lowercase) to a digit and leaves all other characters intact.
Does an snmp manager run a client snmp program : Does an SNMP manager run a client SNMP program or a server SNMP program?
Statements is correct in relation to independent projects : Which one of the following statements is correct in relation to independent projects?
How situation would be handled and what steps to begin with : Discuss how the situation would be handled and what steps to begin with. Examine how data would be retrieved and/or destroyed. Address what steps would be taken to determine the culprit.
Basic social obligation of a business organization : What are the basic social obligation of a business organization? Does this conflict wth the profit objectives of the business? What is social audit?
Examine the significant ways in which business operations : Describe one (1) scenario in which the selected transaction management or concurrency control method is needed. Examine the significant ways in which business operations would have to change if concurrency management methods were not available.
How backtracking search can be used to solve this problem : With the constraint graph preprocessed by AC-3 in part (a), show how backtracking search can be used to solve this problem. To do this, you must draw the search tree generated to find all answers. Indicate (in a summary) the valid schedule(s) that..
Discussion-integration of technology : Technology has changed the way we conduct business on a daily basis. A number of organizations have opted for integrating systems and sharing information with their counterparts.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

  Evaluate the benefits of upgrading software

Evaluate two possible replacement packages, one of which should be an upgrade to the current version of Microsoft Office. Evaluate the benefits of upgrading software as opposed to starting with a new produce line.

  Discussed the physical design step, who is involved

Why should the organization be careful when deciding who as read only access vs. read and update access to data?

  Explain how you would go about decrypting a message that

explain how you would go about decrypting a message that was encrypted in blocks of length two using an affine

  What is data mining and why is it considered controversial

What exactly is "cyber ethics" How is it different from and similar to computer ethics information ethics and Internet ethics and Identify and describe some key aspects of each of the four phases in the evolution of cyber ethics as a field of app..

  Case study - asymmetric and symmetric encryption

Case Study - Asymmetric and Symmetric Encryption, ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics

  What type of access controls are probably configured

If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?

  Explain digital computing/networking in major organizations

Identify and discuss at least three major evolutionary steps in digital computing/networking experienced in major organizations. If possible, provide such insight regarding your current or former organization.

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Determine the category of computer crimes

Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

  Applications of private and public key cryptography

Explain why GPG encryption and decryption are quite fast - Create a file of close to 1 MB size and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd