Analyze the security failures

Assignment Help Management Information Sys
Reference no: EM132281239

Fundamentals of Cybersecurity

OBJECTIVE & PURPOSE:

The purpose of this assignment is to help students be able to: Analyze common security failures and identify specific design principles that have been violated (CSP3); Given a specific scenario, identify the design principles involved or needed to increase the cybersecurity posture (CSP4); and Describe appropriate measures to be taken should a system compromise occur (Business Continuity Plan) (CSF4).

DESCRIPTION OF ASSIGNMENT:

Your assignment will be to first conduct investigation using (Google, newsreport, government report, or any other valid source) into a cyber breach incident of a large company in the past several years. Then, develop a written paper that will provide a summary of the following:

•Cyber Breach Overview: Provide an overview of the cyber breach incident you are discussing in this paper and the organization that it occured in (Use references to support your claims).

•Security Failures: Analyze the security failures and identify specific design principles that have been violated during the identified cyber breach incident (Use references to support your claims).

•Cybersecurity Posture: In your own words (no quotes, but use references to support your claims) identify the design principles involved or needed to increase the cybersecurity posture in the orgenization that was breached.

•Business Continuity Plan: In your own words (no quotes, but use references to support your claims) describe appropriate measures to be taken should a system compromise occur.

•Conclusion: In your own words (no quotes!!!), provide a conclusion that summarises the whole paper.

In particular, you will need to develop a five-page document (not more!) that outlines each of the section above and provides the details to address the points above.

FORMAT:

All text in the proposal should be word-processed (letter or correspondence-quality font), New Times Roman or Calibri, 12 point, double space and standard margins. The body of the proposal should be five-pages long (not including title page, Table of Contents, & Certificate of Authorship).

The following information should also be included:

Title page:

• Project Title

• Assignment Name and Number

• Name and e-mail

• Professor's name

The report should also be done professionally and should include:

• Table of Contents (with sections & page numbers identified)

• Page numbers on all pages

• Clear and consistent headers of all sections

• Reference List following APA closely

• Certificate of Authorship - Use the certificate provided as the last page of the document!

Professional and appealing document is expected! As required by Code of Student Conduct and Academic Responsibility, please make sure to document appropriately your references and state it in your own words, or put in quotations.

Reference no: EM132281239

Questions Cloud

Making an extra payment : You have an outstanding student loan with required payments of $ 600 per month for the next four years.
Promote a product or service : Describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.
Developing examination of the financial statements : Research Coco-Cola and Pepsi on the Internet and download the Income Statement, Statement of Shareholders' Equity, Balance Sheet, and Statement of Cash Flows.
Principal of the loan : You have just taken out a $ 15 000 car loan with a 4 % APR, compounded monthly. The loan is for five years. When you make your first payment in one? month
Analyze the security failures : ISEC-615 - Fundamentals of Cybersecurity : Analyze the security failures and identify specific design principles that have been violated.
Discussion about the different types of financial statements : Think about the different types of financial statements you learned about in this unit (the income statement, statement of retained earnings, balance sheets.
What is the net advantage to leasing : Your firm is considering either leasing or buying some new equipment that belongs in a 20% CCA class. The lease payments will be $5,600 a year.
What happens to annual units demanded for the product : What happens to annual units demanded for the product if the firm increases the per-unit price from $26 to $27? From $42 to $43
Endorse the fund investment policy : Advise Minco's employees on whether to endorse the fund's investment policy.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create the screencast-o-matic video

Create the Screencast-O-Matic video demonstrating the IT solution. Wrapping Up the Capstone System Document and Demonstrating the IT Solution for Acceptance.

  Explain security and threats in the e-commerce environment

Evaluate the effectiveness of an e-commerce Web site. Explain the security and threats in the e-commerce environment. Analyze basic concepts of consumer behavior and purchasing decisions.

  Discuss about the three dimensions of security

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict.

  Explain internal fragmentation and external fragmentation

Imagine an operating system that does not perform memory deallocation. Name at least three unfortunate outcomes that would result and explain your answer.

  Suggest one or more controls to support each policy

The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files.

  Identify critical areas in it infrastructure

To identify critical areas in IT infrastructure that need to be protected and secured from internal and external threats and malicious activities and To provide proper security solutions for all critical areas identified to make organizational com..

  Identify the software engineering code of ethics

Identify the Software Engineering Code of Ethics, ACM code and explain them based on the scenario given.Identify responsibilities of the decision maker.

  What kinds of systems are described in this case

What kinds of systems are described in this case? Identify and describe the business processes each supports.

  What constraints did you experience and how did you handle

Based on Project management and SDLC, describe an IT or similar business project you have done or are currently doing.

  Why corporate culture plays a critical role in developing

Speculate on why corporate culture plays a critical role in developing a more agile product development approach.

  Analyze how communication in groups

analyze how communication in groups differs from individual communication. Are there unique challenges to communicating with groups? Provide examples. Use at least one resource to support your key points

  Describe direct manipulation and virtual environments

Early computer systems relied on command line interfaces to perform all actions. Today, the majority of systems use direct manipulation rather than a command line interface. The goal of designing a direct manipulation interface is to make use of t..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd