Reference no: EM132100691
Threat Name:the name of the threat you are writing about
Threat Description:a brief description of the threat you are writing about, from your perspective
Next Steps:in your opinion, what should your organization do to mitigate this threat?
Source(s):list the sources from which you gathered the information for this report; use APA 6th formatting for your sources
INSTRUCTIONS (remove this section from your final report; included here for directional purposes only)
1. Using the Internet, find an article/story on a current cybersecurity threat, and summarize your research in a one page Information Security Report (ISR).
2. Change the ‘x' in the header to reflect the edition of this report; either 1, 2, 3, 4 or 5.
3. Insert the due date for this report.
4. Insert your name on this report.
5. Insert the name of the threat you are reporting.
6. Insert a few paragraphs describing the threat you are reporting. No more than one (1) page.
7. Describe the next steps that your organization should take to mitigate this threat using the five (5) risk control strategies we discussed in class, which are transfer, mitisate, defend, accept, and terminate.
8. Clearly list the sources you referenced to gather information for this report. Your citations should be written using APA 6th format.
9. Insert your username in the footer, following the words ‘CSCI 410'.
10. Be sure there is no red text in your final report, unless you purposely used red text to highlight something you reported.
Formulate testable hypothesis design experiment to test
: Formulate a testable hypothesis design an experiment to test, & include your controls. Be specific in your experiment design.
|
Show that kinetic energy is not conserved in the collision
: Using the equation for the final velocity in terms of masses and initial velocity of the gliders for a perfectly inelastic collision.
|
How do you suppose two companies in the same space
: In contrasting the two approaches, the I/O model suggests that an organization's strategy is driven by external considerations; the RBV argues that strategy
|
Because of oil embargo by foreign oil-producing countries
: His main income is from the sale of fuel. Because of an oil embargo by foreign oil-producing countries, gasoline is limited,
|
Describe the next steps that your organization should take
: Describe the next steps that your organization should take to mitigate this threat using the five (5) risk control strategies we discussed in class.
|
What is the actual frictional force
: A uniform ladder 5.0 m long rests against a frictionless, vertical wall with its lower end 3.0 m from the wall. The ladder weighs 145 N.
|
Determine the type of evaluation method to use in web design
: The Web application would need to be available on mobile devices (e.g., smartphones, tablets, laptops, notebooks).
|
Most likely to be true about an economic recession
: Which of the following is most likely to be true about an economic recession. Does SunPower use a cost leadership strategy?
|
What is the gauge pressure at given point
: Water flows steadily from an open tank as shown in the figure. (Figure 1) The elevation of point 1 is 10.0 , and the elevation of points 2 and 3 is 2.00.
|