Research the wannacry and the petya cyber-attacks

Assignment Help Other Subject
Reference no: EM132094618 , Length: word count:1800

Part A:

1. Search the web for news on computer security breaches that occurred during January-August 2018. Research one such reported incident. Prepare a report focusing on the following issues:
- What the problem was;
- How and why it occurred;
- What could have been done to prevent it? Length: Around 900 words (Excluding references)

Part B:

Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the following issues:
- What the problem was;
- The scope of the attack;
- Operational details of the attack;
- What could have been done to prevent the attack?

Length: Around 900 words (Excluding references)
- be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.
- be able to explain the fundamental concepts of cryptographic algorithms.
- be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.
- be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system.

Reference no: EM132094618

Questions Cloud

Create a gap in the ability to recover from a disaster : Lack of management support for disaster recovery efforts create a gap in the ability to recover from a disaster. Often, management doesn't see the value.
Discuss the pros and cons of the bill : As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill.
How much revenue will the station receive : If the station manager sells all the advertising slots in advance, how much revenue will the station receive?
What are four important tactical tasks for a negotiator : What are four important tactical tasks for a negotiator in a distributive situation to consider? The response must be typed.
Research the wannacry and the petya cyber-attacks : Research the WannaCry and the Petya cyber-attacks and prepare a report comparing the two, focusing on the issues - justify security goals and the importance
Discuss the size of government and the roles : We often discuss the size of government and the roles we expect the government to play (e.g. protect consumers, workers, and the environment
Complete a first draft of your website plan : Complete a first draft of your Website Plan, that includes the following: Content outline for homepage and at least two sub-pages.
What are the aspects or components of the cyber domain : Give a description of the risk each vulnerability or threat would have on the organization in terms of its people, network, data, or reputation.
What is a project manager : What is a Project? What is a project manager? Does organizational structure impact project success?

Reviews

Write a Review

Other Subject Questions & Answers

  Examine the concept of privilege in american culture

Examine the concept of privilege in American Culture and society. Do you consider yourself privileged, why or why not? After reading the exaples of white.

  Which is a superior system

Benetton outsources most of its production, and most of its retail outlets are owned and operated by franchisees. Which is a superior system?

  Health promotion strategies

Are there any alternative methods used for treatment and what is the effect? Are there any social or cultural influences and are there any health promotion strategies to help prevent Asians from getting heart disease?

  What change processes may be required

Based upon the stakeholder group analyses, recommend the best solution for Ashford General Hospital with detailed justification. Explain why you feel it is the most viable and appropriate solution given the financial impact, HR issues, and interpe..

  Identify dutie and right of parties in an employmet contract

Identify the duties and rights of the parties in an employment contract as well as the liabilities of each in the event of noncompliance.

  Information systems concepts-design and analysis

Please note the summary assignment consists of two parts: 1. articulation the key messages and knowledge of the week chapter(s). 2. how the week chapters(s) relates to your final report. Please note that Your Final report is assume that you will u..

  What you have learned from failure

Paragraphs 2-4 are the supporting paragraphs for your thesis. They should support your thesis statement, have topic sentences that relate to the thesis.

  Describe the activity and two of the science processes

How are critical thinking and communication skills, which are fundamental to student success in today's global economy.

  Analyze the requirements for search and arrest warrants

Write a summary of the article in which you analyze the requirements for search and arrest warrants, and how they relate to the right to privacy.

  Describe a situation you have been in where you believe

Describe a situation you have been in (or are familiar with) where you believe this phenomenon occurred. How did you feel, and how did you respond or not respond? Based on the readings, what main forces guided your response of lack thereof?

  Neighborhood strain-war on poverty

Summarize the following criminology theories: strain theories, anomie, general strain theory, neighborhood strain, and war on poverty.

  Analyze the problems that the technology is aimed to address

Analyze the problems and opportunities that the technology is aimed to address in this organization(s)/setting. Vendor partner recommendations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd