Write a memo to the ceo of the company

Assignment Help Management Information Sys
Reference no: EM131257176

Before doing this assignment, be sure you are familiar with the General Instructions for Written Assignments found in the Course Information Module.

For this assignment, imagine that you are a cybersecurity consultant hired to identify the biggest threats to a company. You can choose any of the following companies:

Amazon
Microsoft
Cisco
Costco
Comcast
Boeing
Wells-Fargo Bank
Your local electric utility
Your local hospital

If you want to choose a different company, ask and you may be allowed to. Just be sure to ask early.

Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the company.

Remember from Module 1 that a threat has three elements: something bad that can happen to the company, an attacker that could make it happen, and a reason why the attacker would want to do it. Your description of each threat must include all three of those.

And when you describe "something bad that can happen", describe the consequences to the company, don't describe the methods that the attackers used. For instance, don't say something about bad passwords or SQL injection. The CEO doesn't know what SQL injection is, and the CEO doesn't need to know that. The CEO needs to know what kind of damage the attack could cause to the company.

Along with the description of each threat, you must also tell the CEO a little bit about an attack that has happened to some other organization that is similar. The CEO needs to understand it is a real threat, not some imaginary threat that has never happened before.

Finally, don't try to tell the CEO what they should be doing to prevent the threats, just tell them about the threats. If they are happy with your work, you will get a follow-on contract where you can provide suggestions for what they can do to prevent them, but not now.

The format of the memo must follow the instructions in the ADMG385MemoFormatting.pdf document linked below. If you've taken ADMG 385 you've probably seen this. Note that the document is both instructions for how to write a memo, and an example of a memo. And notice how the memo is broken into paragraphs. Some students seem to have great difficulty breaking their writing into paragraphs, but it is much easier to read in smaller paragraphs. Do it!

The memo instructions talk about optional headings. You must use a separate heading for each of the three threats.

If you have letterhead that you can write your memo on, either from another class or from your own business or wherever, great, use it. Professional letterhead always makes a memo look better, and you are a professional cybersecurity consultant. But letterhead is not required for the assignment.

The description of each threat must be at least 150 words.

Reference no: EM131257176

Questions Cloud

Identify additional information you would need to recommend : Identify any additional information you would need to recommend a solution, and explain where you would likely find that information.
Conditions produce downward movement of price : Assume Qs represents the quantity supplied at a given price and Qd represents the quantity demanded at the same given price.Wich of the following market conditions produce a downward movement of the price?
Discuss theories about the causes of the collapse : "The Collapse of the Soviet Union." Please respond to the following: Roskin and Berry discuss three theories about the causes of the collapse of the Soviet Union: (imperial overstretch, defective system, bungled reform)
Write a memo to the ceo of the company : Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..
Write a memo to the ceo of the company : Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..
Overcome the measurement error bias : uppose the amount of labor, L , employed by the firms is also a linear function of expected sales: Li = α1 + α2Xi^e Explain how the relationship between L and X^e can be used to overcome the measurement error bias, and justify your suggestion.
Develop a company description : For the first part of your course project, you need to develop a company description based on the following criteria: the company name, its history, its products or services (with brief descriptions), the company mission statement, the company cul..
How many cucumbers can she expect to harvest : How many cucumbers can she expect to harvest? Find the probability that Mimi harvests at least 2 of the 10 cucumbers. Construct a table describing the probability distribution.
Product assembly line to produce signal generators : A manufacturing firm maintains one product assembly line to produce signal generators. Weekly demand for the generators is 35 units. The line operates for 7 hours per day, 5days per week. What is the maximum production time per unit in hours requi..

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is the manufacturer specific id for intel core

What is the manufacturer specific ID for Intel Core and What are some causes of the number of bytes on the wire exceeding the number of bytes being captured

  Discuss pros and cons of moving enterprise-wide applications

Discuss the pros and cons of moving enterprise-wide applications that have traditionally been supported on premises to the cloud. Do some Internet research on identify management and single sign on systems. Briefly explain how these work and why th..

  What are the significant barriers to conversion

Conversion from an idea to an opportunity can be difficult for many organizations. What are the significant barriers to conversion that can prevent an organization for converting a good idea into value or to deliver value to an organization? Give..

  Evaluate the efficiency and reliability

From the e-Activity, examine at least three (3) benefits and three (3) drawbacks that an organization or individual could experience using virtualization. Recommend one (1) individual or organization that would highly benefit from using virtualiza..

  1 employee privacy issue computer internet phone email

1. employee privacy issue computer internet phone email monitoring in the work place.2. the role of mission and vision

  Show intranets and extranets impact

Discuss intranets and extranets impact on organizations and how it has changed the way employees receive training, communicate, conduct transactions, or access information in the workplace.

  Explain what you believe are three most important concerns

Explain what you believe are the three most important concerns when it comes to mobile devices in the workplace. Justify your response.

  Discuss how and why organization should apply sdlc process

Research the process of System Development Life Cycle. Discuss how and why an organization should apply SDLC process

  Showing the various classes identified and their association

The normalised relations that you will implement in the software, showing the attributes and keys together with their field type and "picture" (for example, the type of data that is held - text, a date, a number etc.) A sample table of the basic r..

  Develop internally all technology needed for this product

Develop internally all the technology needed for this product that would allow the firm to license it to other industries and Hire an outside design engineering firm to develop the technology needed.

  Write a simple commission calculation program using ide

Write a simple commission calculation program using IDE, The application will now compare the total annual compensation of at least two salespersons

  Discuss the information systems strategy in a company

You might explore how your local council or regional government are using the web to provide services to its citizens. You should discuss your ideas via email with your e-tutor before committing a substantial effort.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd