Discussion about the cyber-related attack

Assignment Help Computer Engineering
Reference no: EM132789664

Assignment: Research Paper

The group research paper will consist of a 20-page paper at a minimum; not counting the title page, reference pages, and graphs/tables/figures used for the research. The research paper will be written in APA pertaining to a quality management or risk management issue-specific topic -specifically relating to course content found in the textbook.

Company: Target

Here are detailed instructions:

1. Target is an organization, company or agency that suffered a cyber-related attack within the past 5 years.

2. Discuss in your paper the specifics of the attack and how it negatively affected the organization. Make sure you site your source and use in-text citations.

3. Use a table, figure, or any other method to outline or display the type/s of attack/s that occurred and what security controls potentially may have failed the organization.

4. Articulate in your paper what the group believes could have prevented the reported cyber-attack, and, specifically relate this to two or more learning objectives from our course.

Note: I will be paying close attention to this part of the research paper! Therefore, fully discuss this portion in your writings. Use tables/graphs, etc., as necessary.

5. Continually tie your findings to the learning objectives of our course. Therefore, saying this, our textbook will be one of your sources to be used for this assignment.

Things to do:

1. Find and review articles, online books, and other information to use for background and specific information for your research paper.

2. Write the paper with this general template:

3. Title paper with each group member name that participated throughout the research

4. Summarize and then describe the organization/company; including details of the cyber-related incident

5. Critically analyze your research topic; synthesize findings from your sources and tie them to our textbook

6. Propose what security controls, processes or mechanisms that could have prevented the cyber-related incident

7. Conclude your research paper with lessons learned by each group member from lessons learned from this class, your research and your group's proposed prevention recommendation.

You will prepare a presentation in which your team presents the findings. You will need to assign one of your team members to work this presentation as a "side project" for the team; updating it as the team works on the detailed analysis report.

You will need to start work on the presentation early, in day 2! I recommend you work the presentation along with the detailed analysis report. Just some thoughts.

The presentation must include (at a minimum) the following:

1) Overview

2) Summary of the topic and cyber issues; to include findings

3) Drill down on the high risks - Discuss why you felt they presented a greater risk to the agency

4) Recommendations for all of your significant findings (don't worry about the low ones)

Reference no: EM132789664

Questions Cloud

Compute the overall operating income to leamington ketchup : Compute the overall operating income to Leamington Ketchup of growing 100 kilograms of tomatoes, processing it into ketchup
Reduce waiting time : Perform a short literature review on the use of PERT/CPM specifically in a social services, local government or central government project management situation
Write an overview of the discussion : For this project, you will write a 2-3 page APA formatted paper on a how your job/occupation or school major connects to Data Mining.
Identify different type of customers who have to pay : Simplify the decision table. Based on the decision table created earlier, identify different type of customers who have to pay in advance.
Discussion about the cyber-related attack : Discuss in your paper the specifics of the attack and how it negatively affected the organization. Make sure you site your source and use in-text citations.
Describing different types of disasters : You must complete a white paper plan identifying and describing different types of disasters.
How the effectiveness of general controls affects auditor : How the effectiveness of general controls affects the auditor's tests of automated application controls, including the auditor's ability to rely on tests done
Describe the digital divide in your own words : Write/Create a 2-3 page double-spaced paper that addresses these items fully, completely and thoughtfully writing in paragraph style - as in you will end up.
What is meant by an audit trail : Define what is meant by an audit trail and explain how it can be affected by the client's integration of IT. Explain how client internal controls can be improve

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd