Reference no: EM132318390
Assignment: Introduction: For the course project, you are to select a recent (within the last five years) significant security attack. You will research the incident and write a report on your findings. In the report, you will take the role of a security consultant contracting by an investment firm. Your report will be read by mostly non-technical executives at the investment firm. In order to ensure that your client have a good understanding of your report, in addition to describing the incident, its causes, its results, its costs, and steps that could have been/should be taken, you will also have to explain the technical terminology, concepts, techniques, and tools that you use and discuss in the report.
It is very important that you include all references you use for the report. Your report should conclude with a section title "References" that includes the list of resources that you used to write your report. Use the website to guide you in how to format the references to your resources.
In addition to simply listing your references at the end of the report, your must also use citations to the references within your report text. Any fact, opinion, quote, or other information that you use in your report should include a citation that refers to one of your references. Again, refer to the above website for how to do this. In general, if a source is included in your references, it should be cited in your report at least once.
Report Content
Your report should, of course, describe the incident in as much detail as possible. You should attempt to classify the attack as being on confidentially, integrity, or availability (or some combination of these).
When discussing how the attack was carried out, be sure to clearly identify all factors:
• technical
• human
• physical
that were used to carry out the attack.
Include a discussion of the apparent motivation for the attack if one was clearly identified or theories of motivation if
not.
Go into as much detail as possible regarding the attack itself and how it was carried out. Identify the vulnerabilities that allowed the attack. Classify the process of the attack.
Discuss the results of the incident:
• what was taken
• what was destroyed
• what was made unavailable
• who was affected
• what was the harm done
• what was the cost to the different groups affected by the attack
• when were affected group notified of the attack
Finally, looking at the attack process and vulnerabilities exploit, described what measures should be taken to prevent future attacks of the type. Here be sure to clearly identify and cite measures mentioned in one of your sources. If you have your own suggestions, clearly identify them as your own.
How is the lending strategy different to us commercial banks
: How is the lending strategy different to US commercial banks? As a consultant to the CEO, what would you suggest Magda Salarich do now? Please obtain, identify.
|
How much is inventory on the balance sheet as of april
: Quan uses a periodic inventory system. The company had the following data for the month of April. How much is inventory on the balance sheet as of April 30?
|
Briefly explain scada separation architecture
: After writing a mini literature review about Deception Technology pick a specific deception technique and write a literature review about it. Your final paper.
|
Should they be regarded as a change in accounting principle
: Discuss the use of each of these three techniques and their effect on current and future earnings reporting. Explain how changes of accounting estimates.
|
Explain the technical terminology and tools use in report
: For the course project, you are to select a recent (within the last five years) significant security attack. You will research the incident and write a report.
|
Why allocation of costs is necessary for accurate financial
: Some managers believe that allocated costs are arbitrary and therefore not relevant, and that only costs that are direct costs should be reported.
|
What framework or certification process would you recommend
: What framework or certification process would you recommend the organization implement and why? Indicate time, resources, and technology that may be required.
|
What are the total lease payments in this lease arrangement
: The lease arrangement gives Samson the right to purchase the building and land for $11,000,000 at the end of the lease.
|
What would be the impact on the journal entries made
: Assume, instead of a constant rate of increase, the annual lease payments will increase according to the Consumer Price Index (CPI).
|