Describe the overall impact of the attack

Assignment Help Management Information Sys
Reference no: EM132071302

Paper Notes (delete these notes when you submit the paper)

• Use this paper template; do not change it.

• Put all students' names on the title page.

• Use full sentences (except for the main table).

• Use 12 pt, Calibri font; double space

• At least 8 references must be used

• Use APA format for in-text references and the reference list.

• You are not allowed to copy any sentences from a source. No full quotes are allowed. Any plagiarism in a group's paper will result in the whole group receive a failure (F) for the assignment.

Title Page (1 page)

Title: Create a Title for your Paper

Authors: List Authors' Full Names

Section 1. Attack Summary(2 page, double spaced)

• Introduce the cyber incident

• State what your group knew about this attack before starting the paper (even if it's nothing that's fine)

• Describe how the attack works.

• Describe what types of systems and or software are affected

• Describe the overall impact of the attack (could be information like number of countries impacted, number of companies impacted, number of people impacted)

• Describe how it impacts organizations, companies or people (for example, may it causes a denial of service and companies can't use certain systems, maybe it causes all Windows programs to shutdown etc.)

• Describe other interesting things you have found about this incident.

• Use 8 references

Section 2. Visual Representation (1 page, double spaced)

• Provide a high level visual either about how the attack works or that shows the impact of the attack (if can be a graph, a map or some other visual). Remember to cite the source.

• Describe the visual in at least 3 sentences.

Section 3. Table (1 pages, double spaced)

• Create a table consisting of ten pieces of the most interesting information you found out about the cyber incident. You pick the fields that go into the table; you can use things from section 1 as a guide.

Section 3. Group Reflection (1 page, double spaced)

• DO NOT USE ANY SOURCES FOR THIS PART.

• Answer this question: how has your view about cyber security overall changed because of what you learned from your topic? Do not explain concepts to me.

Examples could be: your group is more scared than it was before, or maybe your group is now more aware that cyber attacks can spread more quickly or maybe your group feels that no one is truly safe from cyber attacks...

Section 4. References (1 page)

• List references in APA format.

Presentation Guidelines:

• PPT requirements

• Title slide: all group members who were present at the residency

• Introduction slide: state the name and overall description of the attack

• Impact slide: what were the high level impacts (number of countries, companies and/or individuals impacted), costs incurred because of the attacks etc.

• Attack description slide: describe how the attack works

• Systems/software impact slide: state what systems and/or software are impacted

• Interesting points: describe three most interesting things about your attack that your group found

• Group reflection: how has your group's view about cyber security or attacks changed because of this assignment

• Reference slide: reference list from your paper can be put here

• Presentation tips:

• 10 minutes long

• Limit the text on the slides, do not read slides

• Use visuals as much as possible vs text

• Any group member should be able to give the PPT, make sure each group member has learned about the topic

• Only one group member needs to present the PPT; the group members who do not present will be asked a question by the professor

Reference no: EM132071302

Questions Cloud

Types of lawn mowers and push mowers : A company manufactures two types of lawn mowers and push mowers. The company has the option of manufacturing the mowers in-house or outsourcing
Values for the restaurant industry : Locate the average values of these values for the restaurant industry and comment on how well or poorly Frank's All-American BarBeQue
How are authentication and authorization alike : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?
How much taxable gain will brooke recognize from the sale : Three years after the contribution date, the land contributed by Brooke is sold. How much taxable gain will Brooke recognize from the sale
Describe the overall impact of the attack : Describe the overall impact of the attack (could be information like number of countries impacted, number of companies impacted, number of people impacted)
Expand the capacity of the plant : A plant manager needs to decide whether to expand the capacity of the plant. There are two states of nature: favorable and unfavorable.
Develop a cost-estimating equation : Assume the local cable company has the following information available. Using high-low method, develop cost-estimating equation for total annual operating cost
Describe the visual in at least three sentences : Provide a high level visual either about how the attack works or that shows the impact of the attack (if can be a graph, a map or some other visual).
Marketplace in the near future : Google is developing a self-driving car that will be in the marketplace in the near future. Identify a potential market segment

Reviews

Write a Review

Management Information Sys Questions & Answers

  Outline differences between first and third party cookies

In two or three paragraphs, outline the differences between first-party cookies and third party cookies. In one or two paragraphs, explain what a Web bug is, what it accomplishes, and who might use one.

  Analyze proper physical access control safeguards

Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

  Calculate the minimum storage capacity

A speech signal has a total duration of 10 s.- Calculate the minimum storage capacity needed to accommodate this digitized speech signal.

  Description of accounting information system

Description of Accounting information system - What is an accounting information system? How does it differ from other information systems within an organization?

  Develop information technology systems

Developing Information Technology Systems - Why do organizations develop IT systems?

  Important information about new economyyou have been asked

important information about new economyyou have been asked to visit a local company to talk to an information systems

  Topic of information systems infrastructure

Research at least three articles on the topic of Information systems infrastructure: evolution and trends. Write a brief synthesis and summary of the article

  Describe the types of optical input devices

How can a cache be used to improve performance when reading data from and writing data to a storage device ?

  Prepare a resume and cover letter for the possible job

what you have learned while working with Word, You will create a resume and cover letter for a potential job.Assume you are graduating this semester and need to find a job immediately after graduation. Check your local newspaper or online employmen..

  Problem experiment with alternative web browsers and

problem experiment with alternative web browsers and compare their utility and features.compare the performance of your

  Research how to open a combination lock

Research how to open a combination lock when the combination will not work.

  Critique the merits of major services found on dms website

Analyze the security mechanisms needed to protect the DMS systems. Critique the merits of the major services found on the DMS Website.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd