Explain the technical terminology and tools use in report

Assignment Help Other Subject
Reference no: EM132318390

Assignment: Introduction: For the course project, you are to select a recent (within the last five years) significant security attack. You will research the incident and write a report on your findings. In the report, you will take the role of a security consultant contracting by an investment firm. Your report will be read by mostly non-technical executives at the investment firm. In order to ensure that your client have a good understanding of your report, in addition to describing the incident, its causes, its results, its costs, and steps that could have been/should be taken, you will also have to explain the technical terminology, concepts, techniques, and tools that you use and discuss in the report.

It is very important that you include all references you use for the report. Your report should conclude with a section title "References" that includes the list of resources that you used to write your report. Use the website to guide you in how to format the references to your resources.

In addition to simply listing your references at the end of the report, your must also use citations to the references within your report text. Any fact, opinion, quote, or other information that you use in your report should include a citation that refers to one of your references. Again, refer to the above website for how to do this. In general, if a source is included in your references, it should be cited in your report at least once.

Report Content

Your report should, of course, describe the incident in as much detail as possible. You should attempt to classify the attack as being on confidentially, integrity, or availability (or some combination of these).

When discussing how the attack was carried out, be sure to clearly identify all factors:

• technical

• human

• physical

that were used to carry out the attack.

Include a discussion of the apparent motivation for the attack if one was clearly identified or theories of motivation if
not.

Go into as much detail as possible regarding the attack itself and how it was carried out. Identify the vulnerabilities that allowed the attack. Classify the process of the attack.

Discuss the results of the incident:

• what was taken

• what was destroyed

• what was made unavailable

• who was affected

• what was the harm done

• what was the cost to the different groups affected by the attack

• when were affected group notified of the attack

Finally, looking at the attack process and vulnerabilities exploit, described what measures should be taken to prevent future attacks of the type. Here be sure to clearly identify and cite measures mentioned in one of your sources. If you have your own suggestions, clearly identify them as your own.

Reference no: EM132318390

Questions Cloud

How is the lending strategy different to us commercial banks : How is the lending strategy different to US commercial banks? As a consultant to the CEO, what would you suggest Magda Salarich do now? Please obtain, identify.
How much is inventory on the balance sheet as of april : Quan uses a periodic inventory system. The company had the following data for the month of April. How much is inventory on the balance sheet as of April 30?
Briefly explain scada separation architecture : After writing a mini literature review about Deception Technology pick a specific deception technique and write a literature review about it. Your final paper.
Should they be regarded as a change in accounting principle : Discuss the use of each of these three techniques and their effect on current and future earnings reporting. Explain how changes of accounting estimates.
Explain the technical terminology and tools use in report : For the course project, you are to select a recent (within the last five years) significant security attack. You will research the incident and write a report.
Why allocation of costs is necessary for accurate financial : Some managers believe that allocated costs are arbitrary and therefore not relevant, and that only costs that are direct costs should be reported.
What framework or certification process would you recommend : What framework or certification process would you recommend the organization implement and why? Indicate time, resources, and technology that may be required.
What are the total lease payments in this lease arrangement : The lease arrangement gives Samson the right to purchase the building and land for $11,000,000 at the end of the lease.
What would be the impact on the journal entries made : Assume, instead of a constant rate of increase, the annual lease payments will increase according to the Consumer Price Index (CPI).

Reviews

Write a Review

Other Subject Questions & Answers

  What elements might you use to integrate innovation solution

Discuss the key elements of integrating innovation into a traditional total rewards program. In other words, in your current total rewards program what element.

  Personality characteristics-living styles

Discuss the most creative people you know. What are their personality characteristics, living styles, and creating methods?

  Modern sedimentary systems like rivers-glaciers-deserts

Why is so much attention paid to modern sedimentary systems like rivers, glaciers, deserts, and so on?

  Nurse manager and amniocentesis patient information sheet

You are a medical representative of a company that specializes in endoscopes. Write a letter to the new nurse manager of a multi-specialty office. The letter should describe the types of endoscopes you sell

  What items does it specifically cover

What items does it specifically cover? Are there limitations or restrictions? What do they require you to do to be covered or protected by law

  Argue in defense of your original position

Investors are mainly protected by The Securities Act of 1933 which was designed to: "require that investors receive financial and other significant information concerning securities being offered for public sale; and prohibit deceit, misrepresenta..

  Describe the eating disorders anorexia

Describe the eating disorders anorexia, bulimia, and binge-eating disorders. What are their characteristic features? How does culture influence these disorders?

  Describe the effect that the presidential doctrine has had

Describe the effect that the presidential doctrine has had on regional or global affairs since it was announced during the Cold War.

  Effective in refining solutions

What are the two steps that would be the most effective in refining solutions to the problem and resolutions to the issues presented by your topic

  Operant conditioning project

positive punishment,  negative punishment,  positive reinforcement, and  negative reinforcement

  What is the utilization of the bartender

Bartender at resort can serve drinks at the rate of one every50 seconds. During a hot evening recently, the bar wasparticularly busy and every 55 seconds someone was at the barasking for a drink.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd