What are the sorts of cyber-attacks that can be expected

Assignment Help Management Information Sys
Reference no: EM13835189 , Length:

In this assignment, your task is to create a report on the threat scope against a specific target. There are three profiles for these threats, of which you choose one.

The three profiles are:

1) Policy Profile: You are the Chief Information Security Officer (CISO) for a large multinational enterprise with a very large collection of intellectual property that represents a major portion of your business' holdings. What are the threats against your corporate network, where do they come from and what do you need to mitigate against them? Keep in mind that, as a CISO, you are more interested in developing Policy and Procedure than day to day threat management.

2) Response Profile: You are a threat researcher for a Computer Emergency Response Team (CERT) that is responsible for protecting Government networks. The Government will be releasing an unpopular policy in the near future and is expecting attacks from "hacktivists".

What are the sorts of cyber-attacks that can be expected? How can the agency organise itself now to help reduce the impact of those cyber-threats? Remember that Government agencies often have lots of partners and social media accounts.

3) Technical Level: You are a penetration tester providing services to a client (i.e. not the company you work for), who is a major national accounting firm. Identify the risks to your company in performing the penetration test, identify the standard framework for conducting a penetration test and the methods that you would employ to conduct the test.

Your assignment is to choose one of those profile, and write a report that is at least 3000 words or 15 pages (whichever is longer). Your assignment should cover the above brief for your profile, and to also cover the following aspects:

• What are the countermeasures to those threats, and how do they fit within the Situational Crime Prevention framework?

• How does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?

• Is your problem of international scope and, if so, how?

 

Verified Expert

Reference no: EM13835189

Questions Cloud

Can the funds be raised from existing members or anyone else : Can the funds be raised from existing members or anyone else without a prospectus? Does the CA provide any protection for directors where funds are raised under a prospectus that contains a misleading statement?
The er complaining of severe rectal bleeding : An 86-y/o gentleman presented to the ER complaining of severe rectal bleeding. Flexible colonoscopy was performed, during which diverticulitis was noted in the sigmoid colon
Evaluate the outdoor play environment : Your task is to evaluate the outdoor play environment to determine if it supports physical growth for those in early and middle childhood in a safe and secure way
Calculate the annual payment on the loan : Golf Course installing a new AutomaticSprinkler SystemThe eighteen-hole Redwood Golf Course is in need of a new sprinkler system, which is estimatedto cost $1 million. The Golf Course Superintendent, who is in charge of maintaining the golfcourse, ha..
What are the sorts of cyber-attacks that can be expected : What are the countermeasures to those threats, and how do they fit within the Situational Crime Prevention framework and how does the current law help or hinder your countermeasures? Are there any proposals for laws that would assist?
Take advantage of high domestic interest rates : A US based speculator wanted to take advantage of high domestic interest rates in ABC-Land. One month ABC-Land treasuries offered 40% pa interest while speculator's US dollar cost was only 20%pa. Speculator bought $10,000,000 equivalent of one-month ..
How a piece of dead bone is removed from the body : The physician treats a patient who has osteomyelitis of the left scapula following a past injury. A piece of dead bone is removed from the body of the scapula. How is this coded
Why do you consider these important to mention : Why do you consider these important to mention
Do you see any issues related to educator : Do you see any issues related to being both an educator and a researcher? If so, what are these issues and what might you do to avoid them

Reviews

Write a Review

Management Information Sys Questions & Answers

  Please help answer the questionsanswer each question in 250

please help answer the questionsanswer each question in 250 words and each response must have apa formatted citations

  Drawbacks of instituting a quality policy

What are some options for ensuring that testing will always be utilized to its fullest abilities. Any well-defined and planned project will have a quality plan in place before development begins.

  What assumptions did professor mcpherson make

Source: Corporate Information Systems Management: Text and Cases (6th ed.) by Applegate, McFarlan, and Austin, What assumptions did Professor McPherson make about information technology support at the London-based airlines? Do you believe those are r..

  This addresses data security hierarchy amp related issues1

this addresses data security hierarchy amp related issues.1. while storing data a company needs to ensure its security

  Describe information management system

Research and write about your company's (Starbucks) Information Management System and respond to the following questions. Describe their information management system (IMS).

  Lessening role in the decision making process

What is BYOD and do you think that BYOD is one of the reasons why telecom/IT departments have a lessening role in the decision making process

  Write a paper discussing managerial issues

Write a paper discussing managerial issues associated with managing an organization's IS infrastructure.

  Question 1nbsp the table sets out the demand and supply

question 1nbsp the table sets out the demand and supply schedules for chewing gum.pricecents per packquantity

  Explain offshore outsourcing for software development

Tablets Take Their Place in the PC Market - What will happen to offshore outsourcing for software development? Can outsourcing firms in India and China for example be expected to develop software systems for use in U.S. schools?

  Examples of software failure

Investigate examples of software failure and see if you can discern any trends.

  Describe business uses for mobile/smart phone technologies.

Describe at least five business uses for mobile/smart phone technologies. Discuss at least four of the characteristics of m-commerce that makes it beneficial to businesses and consumers

  Question one herbert simon and allen newell explored human

question one herbert simon and allen newell explored human decision making management science and artificial

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd