Discussion about the cyber-related attack

Assignment Help Computer Engineering
Reference no: EM132789664

Assignment: Research Paper

The group research paper will consist of a 20-page paper at a minimum; not counting the title page, reference pages, and graphs/tables/figures used for the research. The research paper will be written in APA pertaining to a quality management or risk management issue-specific topic -specifically relating to course content found in the textbook.

Company: Target

Here are detailed instructions:

1. Target is an organization, company or agency that suffered a cyber-related attack within the past 5 years.

2. Discuss in your paper the specifics of the attack and how it negatively affected the organization. Make sure you site your source and use in-text citations.

3. Use a table, figure, or any other method to outline or display the type/s of attack/s that occurred and what security controls potentially may have failed the organization.

4. Articulate in your paper what the group believes could have prevented the reported cyber-attack, and, specifically relate this to two or more learning objectives from our course.

Note: I will be paying close attention to this part of the research paper! Therefore, fully discuss this portion in your writings. Use tables/graphs, etc., as necessary.

5. Continually tie your findings to the learning objectives of our course. Therefore, saying this, our textbook will be one of your sources to be used for this assignment.

Things to do:

1. Find and review articles, online books, and other information to use for background and specific information for your research paper.

2. Write the paper with this general template:

3. Title paper with each group member name that participated throughout the research

4. Summarize and then describe the organization/company; including details of the cyber-related incident

5. Critically analyze your research topic; synthesize findings from your sources and tie them to our textbook

6. Propose what security controls, processes or mechanisms that could have prevented the cyber-related incident

7. Conclude your research paper with lessons learned by each group member from lessons learned from this class, your research and your group's proposed prevention recommendation.

You will prepare a presentation in which your team presents the findings. You will need to assign one of your team members to work this presentation as a "side project" for the team; updating it as the team works on the detailed analysis report.

You will need to start work on the presentation early, in day 2! I recommend you work the presentation along with the detailed analysis report. Just some thoughts.

The presentation must include (at a minimum) the following:

1) Overview

2) Summary of the topic and cyber issues; to include findings

3) Drill down on the high risks - Discuss why you felt they presented a greater risk to the agency

4) Recommendations for all of your significant findings (don't worry about the low ones)

Reference no: EM132789664

Questions Cloud

Compute the overall operating income to leamington ketchup : Compute the overall operating income to Leamington Ketchup of growing 100 kilograms of tomatoes, processing it into ketchup
Reduce waiting time : Perform a short literature review on the use of PERT/CPM specifically in a social services, local government or central government project management situation
Write an overview of the discussion : For this project, you will write a 2-3 page APA formatted paper on a how your job/occupation or school major connects to Data Mining.
Identify different type of customers who have to pay : Simplify the decision table. Based on the decision table created earlier, identify different type of customers who have to pay in advance.
Discussion about the cyber-related attack : Discuss in your paper the specifics of the attack and how it negatively affected the organization. Make sure you site your source and use in-text citations.
Describing different types of disasters : You must complete a white paper plan identifying and describing different types of disasters.
How the effectiveness of general controls affects auditor : How the effectiveness of general controls affects the auditor's tests of automated application controls, including the auditor's ability to rely on tests done
Describe the digital divide in your own words : Write/Create a 2-3 page double-spaced paper that addresses these items fully, completely and thoughtfully writing in paragraph style - as in you will end up.
What is meant by an audit trail : Define what is meant by an audit trail and explain how it can be affected by the client's integration of IT. Explain how client internal controls can be improve

Reviews

Write a Review

Computer Engineering Questions & Answers

  Analyzing the attack using given information

Attack Analysis: After collecting evidence and analyzing the attack, the third party was able to recreate the attack. No-Internal-Controls, LLC has a number.

  Determine average temperature on surface of circuit board

A 12-cm-high and 20-cm-wide circuit board houses 100 closely spaced logic chips on its surface, each dissipating 0.05W.

  Create a scatter plot of calories modeled

Create a scatter plot of `calories` modeled by `sugars` using the `shelf` variable to create different plot characters.

  Difference between passive and active security threats

What is the difference between passive and active security threats? List and briefly define categories of passive and active security attacks.

  Create the systems integration project proposal shell

For the assignments in this course, you will be developing a comprehensive Systems Integration Design Proposal as your project. Your first task in this process.

  Compare harvard architecture and von neumann architecture

Compare harvard architecture and Von Neumann architecture and also what is both architectureCompare harvard and von neumann architecture and process.

  Describe the aspects of each erm implementation

Chapter 3 presented the approach Mars, Incorporated used to implement ERM, and chapter 5 presented the University of California Health System's ERM development.

  Write a method public static array list merge

Write a method public static Array List merge(Array List a, Array List b) that merges two array lists, alternating elements from both array lists.

  Define the advantages of the following types

define the advantages of the following types.

  Describe the behavior of the data

Methods are the members of a class that describe the behavior of the data. The Main( ) method is required for both console and Windows applications.

  How many computers are needed for this system

What hardware is needed to have a web-site and client to browse the properties on that web-site?

  Determining occurance as incident or disaster

Categorize the following occurrences as an incident or disaster. If an occurrence is a disaster, find whether or not business continuity plans would be called into play.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd