Attacking more than just the enterprise

Assignment Help Computer Networking
Reference no: EM13766696 , Length: 1200 words

Attacking More Than Just the Enterprise

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry. Read the article titled, "Verizon DBIR 2012: Automated large-scale attacks taking down SMBs" located at the following SearchSecurity link: https://searchsecurity.techtarget.com.au/news/2240147412/Verizon-DBIR-2012-Automated-large-scale-attacks-taking-down-SMBs.

Write a three to four (3-4) page paper in which you:

  • Evaluate the recent trend toward attacking small and medium businesses and identify the benefits that these types of businesses have which attract attackers.
  • Compare and contrast the digital forensic operations of small-sized companies to large companies in terms of costs, personnel, inexperience, naivety, etc.
  • Explain the common purpose of attacks on point-of-sale (POS) systems and identify why you as a security professional would have cause for concern for your customers' POS systems.
  • Assess why and how these POS systems have become a prime target for hacking groups.
  • Examine the forensics challenges that exist for investigations on POS systems.
  • Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Outline system forensics issues, laws, and skills.
  • Describe and analyze practices in obtaining digital evidence.
  • Use technology and information resources to research advanced issues in computer forensics.
  • Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

 

Reference no: EM13766696

Questions Cloud

Conversation between two employees of linquest technologies : The following is an excerpt from a conversation between two employees of Linquest Technologies, Don Corbet and Rita Shevlin. Don is the accounts payable clerk, and Rita is the cashier.
Engineer concern about the overhead rate : What is the engineer's concern about the overhead rate going "up and up"? What did the engineer mean about the large overhead rate being a disadvantage when placing bids and seeking new business?
Compute the book value per share : We know the following about Bob & Co. Total assets are $1000m, E is $700m, cash is $500m and the # of shares is 1m. We estimate that the market value of equity is 2 times the book value of it. Finally, a fire sale of the firm would bring 70% of the v..
Depreciation expense-capital expenses-debt-debt principal : Mary has EAT, depreciation expense, capital expenses, debt and debt principal payments of $2m, $2.8m, $1.3m, $40m and $1.5m respectively. Moreover, Mary had operating profit of $2.5 million and its assets went from a total of $35 to $38 million. Addi..
Attacking more than just the enterprise : Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.
Which type of business structure would be the worst : Sally Gomez is interested in starting a new business. Although Gomez has developed her business plan and is ready to implement her ideas, she lacks the necessary finances to begin her new business. Along with a lack of finances, Gomez worries about t..
Difference between accrual and cash accounting : What is the difference between accrual and cash accounting? When might an accountant use cash basis accounting without violating generally accepted accounting principles?
Determine the impact of potential logical threats : Determine the impact of at least five potential logical threats that require attention. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the ..
Principles of constructivist teaching : Explain and give examples showing how these tenets support science literacy.

Reviews

Write a Review

Computer Networking Questions & Answers

  How to select peer-to-peer-server-based or hybrid network

Individual employees also should be able to control resources their own machines. Would you select peer-to-peer, a server-based, or a hybrid network? Explain why?

  The router''s hostname and bri interface

This is Mark's first time configuring routers and switches. Mark thought it was simply a matter of installing them, and they would just work. However, now you are reading a manual on configuring routers and switches. The first thing you notice is ..

  Explain the key concepts of circuit switching and packet

write a 4- to 6-page paper use tables whenever possible toquestion 1 describe open systems interconnection osi protocol

  New privacy issues related to cyberspace

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios

  Explain four different types of wireless technologies

Explain four different types of wireless technologies in a 350- to 700-word paper in APA format. Describe the characteristics and properties of each signal type, and how each can be used.

  Determine maximum value for tcp sequence numbers

Determine the maximum value of L such that TCP sequence numbers are not exhausted? Recall that TCP sequence number filed has four bytes.

  What are the most significant criteria for choosing a wan

question 1 what are the most important criteria for selecting a wan service provider? list and explain at least five.

  Acknowledge technoogy-s polypotency

Richard Sclove argues that we must do more to acknowledge technoogy's 'polypotency.' What does this term mean, why does Sclove think that it is significant to acknowledge this characteristic of technology?

  Produce a test plan for the new inventory system

Produce a report detailing how you will manage the transition to the new platform so as to assure the quality of the process and hence the outcome.

  Create a 3-4-page memo outlining what you have done as the

over the past several years the chief executive officer ceo of your company has read articles on internet control

  Benefits and drawbacks of mentoring relationship

Using the Internet, research and read about mentoring. Based on your reading, post your responses to the following topics of discussion

  Write down a 2 page research paper excluding the title page

write a 2 page research paper excluding the title page on the five layers of tcpip protocol suite. in addition to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd