Reference no: EM133870931 , Length: word count:2000 + PPT
Information Systems Risk and Security
Assessment: Cybersecurity Incident Analysis - Marriott International Data Breach Scenario
Introduction
The Marriott International data breach affected millions of customers, exposing sensitive personal information. This breach occurred in 2018 and involved unauthorized access to the Starwood reservation database, revealing names, phone numbers, email addresses, and in some cases, encrypted credit card details. Marriott faced significant backlash from customers and authorities due to delayed detection and response to the breach. The breach exposed systemic cybersecurity vulnerabilities and led to financial penalties, reputational damage, and lawsuits. In the following link you can find the detail about incidents
Working on the scenario explained above, create a detailed report for "Risk and Cost" analysis. The report should include the sections below:
Executive Summary:
Overview of the cybersecurity incident and its impact it caused.
Summary of key findings from the Security Risk and Cost Analysis.
Introduction:
Background information on Equifax and the nature of the cyberattack.
Objectives of the making the Security Risk and Cost Analysis.
Assets Analysis:
Detailed description of Equifax's critical assets, the value of each asset, and their importance to the organization.
Threats & Vulnerabilities Analysis:
Identification and analysis of external and internal threats targeting Equifax.
Assessment of vulnerabilities in the company's systems, processes, and third party relationships.
Data Loss Analysis:
Evaluation of the impact of the data breach on customers, the company, and other stakeholders.
Estimation of financial losses, legal liabilities, and remediation costs associated with the incident.
Risk Assessment:
Evaluation of the likelihood and potential impact of identified risks on Equifax's business continuity and reputation.
Prioritization of risks based on severity and urgency for mitigation.
Cost Analysis:
Estimation of costs associated with implementing recommended security measures and mitigating identified risks.
Recommendations:
Specific actions to strengthen Equifax's cybersecurity posture and mitigate identified risks.
Conclusion:
Summary of key insights and recommendations from the Security Risk and Cost Analysis.
Case Study Introduction: EITest Scam Impact on Our Bank
Concerned about the potential risks posed by this threat, Our Bank has tasked your team with conducting a comprehensive security report to assess the vulnerabilities and potential Business Impact Analysis due to the EITest scam and to maintain their Business Continuity. Your team has been tasked to study this case and compile a comprehensive security report comprising Business Impact Analysis, and Business Continuity Plan and evaluate the potential cyber threats and risks posed by the EITest scam to Our Bank. The report should analyze the impact of the scam on Our Bank's systems, networks, and data security, as well as provide recommendations for mitigating the identified risks and enhancing the organization's cybersecurity defences to maintain the business continuity. Your recommendations should be presented in both a written report and an oral presentation.
Your report should include the below sections.
Executive Summary: Overview of EITest scam and its potential impact on Our Bank.
Introduction: Provide background information on Our Bank and its global presence, highlighting the diversity of its customer base and the potential vulnerability of non-tech-savvy users to cyber threats.
Threat Analysis: Identify and analyze the potential cyber threats posed by the EITest scam, including compromised websites, malicious redirection, and exploit kits. You have to perform a detailed analysis of the EITest Scam and then report in this section.
Vulnerability Assessment: Assess the vulnerabilities in Our Bank's systems, networks, and processes that could be exploited by the EITest scam. Expert online assignment help in the USA!
Risk and business impact Analysis: Conduct a risk assessment to determine the likelihood and potential impact of EITest to Our Bank and make a BIA identifying its main functions and stakeholders.
Business Continuity plan: Provide an actionable business continuity plan to Our Bank's defences against the EITest scam. This may include implementing security controls, enhancing employee training programs, improving incident response capabilities, and fostering a culture of cybersecurity awareness across all branches.
Conclusion: Summarize the key findings and recommendations from the security report. Emphasize the importance of proactive measures to mitigate the risks posed by the EITest scam and safeguard Our Bank's systems, data, and reputation from cyber threats.
Oral Presentation: Explain your contribution of the above analysis and your conclusion about the EITest scam.
The report should be 2000 words
Presentation
The presentation should not exceed 10 minutes in recording and must be recorded as a group meeting.