Describe the overall impact of the attack

Assignment Help Management Information Sys
Reference no: EM132071302

Paper Notes (delete these notes when you submit the paper)

• Use this paper template; do not change it.

• Put all students' names on the title page.

• Use full sentences (except for the main table).

• Use 12 pt, Calibri font; double space

• At least 8 references must be used

• Use APA format for in-text references and the reference list.

• You are not allowed to copy any sentences from a source. No full quotes are allowed. Any plagiarism in a group's paper will result in the whole group receive a failure (F) for the assignment.

Title Page (1 page)

Title: Create a Title for your Paper

Authors: List Authors' Full Names

Section 1. Attack Summary(2 page, double spaced)

• Introduce the cyber incident

• State what your group knew about this attack before starting the paper (even if it's nothing that's fine)

• Describe how the attack works.

• Describe what types of systems and or software are affected

• Describe the overall impact of the attack (could be information like number of countries impacted, number of companies impacted, number of people impacted)

• Describe how it impacts organizations, companies or people (for example, may it causes a denial of service and companies can't use certain systems, maybe it causes all Windows programs to shutdown etc.)

• Describe other interesting things you have found about this incident.

• Use 8 references

Section 2. Visual Representation (1 page, double spaced)

• Provide a high level visual either about how the attack works or that shows the impact of the attack (if can be a graph, a map or some other visual). Remember to cite the source.

• Describe the visual in at least 3 sentences.

Section 3. Table (1 pages, double spaced)

• Create a table consisting of ten pieces of the most interesting information you found out about the cyber incident. You pick the fields that go into the table; you can use things from section 1 as a guide.

Section 3. Group Reflection (1 page, double spaced)

• DO NOT USE ANY SOURCES FOR THIS PART.

• Answer this question: how has your view about cyber security overall changed because of what you learned from your topic? Do not explain concepts to me.

Examples could be: your group is more scared than it was before, or maybe your group is now more aware that cyber attacks can spread more quickly or maybe your group feels that no one is truly safe from cyber attacks...

Section 4. References (1 page)

• List references in APA format.

Presentation Guidelines:

• PPT requirements

• Title slide: all group members who were present at the residency

• Introduction slide: state the name and overall description of the attack

• Impact slide: what were the high level impacts (number of countries, companies and/or individuals impacted), costs incurred because of the attacks etc.

• Attack description slide: describe how the attack works

• Systems/software impact slide: state what systems and/or software are impacted

• Interesting points: describe three most interesting things about your attack that your group found

• Group reflection: how has your group's view about cyber security or attacks changed because of this assignment

• Reference slide: reference list from your paper can be put here

• Presentation tips:

• 10 minutes long

• Limit the text on the slides, do not read slides

• Use visuals as much as possible vs text

• Any group member should be able to give the PPT, make sure each group member has learned about the topic

• Only one group member needs to present the PPT; the group members who do not present will be asked a question by the professor

Reference no: EM132071302

Questions Cloud

Types of lawn mowers and push mowers : A company manufactures two types of lawn mowers and push mowers. The company has the option of manufacturing the mowers in-house or outsourcing
Values for the restaurant industry : Locate the average values of these values for the restaurant industry and comment on how well or poorly Frank's All-American BarBeQue
How are authentication and authorization alike : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?
How much taxable gain will brooke recognize from the sale : Three years after the contribution date, the land contributed by Brooke is sold. How much taxable gain will Brooke recognize from the sale
Describe the overall impact of the attack : Describe the overall impact of the attack (could be information like number of countries impacted, number of companies impacted, number of people impacted)
Expand the capacity of the plant : A plant manager needs to decide whether to expand the capacity of the plant. There are two states of nature: favorable and unfavorable.
Develop a cost-estimating equation : Assume the local cable company has the following information available. Using high-low method, develop cost-estimating equation for total annual operating cost
Describe the visual in at least three sentences : Provide a high level visual either about how the attack works or that shows the impact of the attack (if can be a graph, a map or some other visual).
Marketplace in the near future : Google is developing a self-driving car that will be in the marketplace in the near future. Identify a potential market segment

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why would companies limit the number of units produced

Why would companies limit the number of units produced? Does this invariably lead to "black markets"? How do black markets shift the supply and demand curves?

  What is some information about enron scandal

Who was the responsible for the downfall of Enron and World-com?

  Discuss the method of mandatory access control

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor.

  Discuss ethical implications of clinical efficiency research

Analyze the impact of using the Internet to communicate consumer information. Assess the impact of organizational research and the use of IT to collect data. Discuss the ethical implications of clinical efficiency research with monitoring and trackin..

  Discuss kind of information system reports hospital staff

Discuss the kind of Information System reports hospital staff and doctors need from the new tracking system. How can case managers and disease managers improve their collaboration and communication with doctors?

  Develop understanding of the opportunities in e-commerce

Develop your understanding of the opportunities related to e-commerce. For this assignment, you need to do the items that follow.

  How does the epidemiologic triad apply to health issues

How does the epidemiologic triad apply to health issues we see in the hospital? What are some common diagnoses in the acute care setting?

  Why ebay is or is not a perfect model for the integration

Write a 3.5-page paper in APA format in response. Explain why eBay is or is not a perfect model for the integration of all the aspects of e-commerce.

  Compare and contrast database backup & disaster planning.

describe, compare and contrast Database Backup & Disaster Planning.

  Describe and identify the elements of data backup planning

Define, describe and identify the elements of (a) good Data Backup Planning, (b) good Disaster Recovery Planning, and (c) good Business Continuity Planning. Be sure to identify and describe any interdependencies in the planning.

  Evaluate two out-of-scope functionalities for the mobile app

Your Mobile Ordering Project team was asked to evaluate two "out-of-scope" functionalities for the Mobile Ordering App.

  Discuss project cost benefit analysis

COIT20248 – Information Systems Analysis & Design - What are the primary functional requirements for the system in the case study

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd