Reference no: EM132158453
Question: 1. University Security Breach
The University of Nebraska's data breach affected over 600,000 students in 2012. This was one of the largest data breaches reported for a university campus. Read the following reports about the data breach and then answer the questions below.
• U of Nebraska Breach Affects 650,000 (By Jeffrey Roman)
• Security Incident May 2012 University of Nebraska
• Higher Ed Data Breaches at Near-Record High in 2012 (By Dian Schaffhauser)
Discuss the ramifications of the event, what might be the vulnerabilities that were exploited, regulatory and compliance issues associated with the event and what, if you were the CISO would be your recommended course/courses of action to ensure this type of incident did not happen in the future. Please remember to cite your sources.
2. Threat Model Analysis
Please read Microsoft's Threat Model Analysis.
Now, describe what you learned. How could you use this model to help improve cyber security in an organization? Please discuss in detail.
|
Develop and comment on an it planning process
: Develop and comment on an IT planning process for ModMeters to accomplish the demands as set out in the ModMeters case study.
|
|
Which domains of the it infrastructure were involved
: In the past year, Company M experienced 22 information security incidents, most of which involved lost or stolen laptops, tablet PCs, and smartphones.
|
|
What measurements would be needed
: Prepare a short paper (3 to 5 strong paragraphs) in which you explain how researchers could use the TAM model to explore the factors influencing employee.
|
|
Identify and discuss technological and financial risks
: The company has approximately 1,500 employees in three locations around the United States and generates $50 million in annual revenues.
|
|
How could you use model to help improve cyber security
: Now, describe what you learned. How could you use this model to help improve cyber security in an organization? Please discuss in detail.
|
|
Describe the business environment and identify the risk
: As an IT professional, you'll often be required to communicate policies, standards, and practices in the workplace.
|
|
Contemporary financial planning investment decision
: You should review compare, contrast and synthesize the points presented within the articles to reach a conclusion on how professionals feel on the issue being
|
|
Develop and comment on an it planning process
: Develop and comment on an IT planning process for ModMeters to accomplish the demands as set out in the ModMeters case study.
|
|
Why is it important to have people to influence operations
: The strategic repercussions of capacity decision can be vast, influencing various aspect of an organization.
|