Explain what technique should be used to start investigation

Assignment Help Management Information Sys
Reference no: EM131360964 , Length: 8

Assignment : Mitigating Cyber-Crime-Related Threats Report

Organizations of all sizes should be concerned with the security and confidentiality of their electronic data. Cyber crimes affect individuals and companies alike. However, companies typically have more financial and other assets that can be compromised by various cyber crimes. Establishing an organization-wide information security program is a great start to mitigating cyber-related crimes and attacks. This process typically commences with an honest evaluation of the organization's vulnerabilities and potential threats. For this assignment, you will read a brief scenario and develop a 6- to 8-page report answering the required questions.

Scenario

A contractor for the US military builds proprietary communication devices and peripherals, which allow soldiers in combat to communicate with command officers and personnel. These devices are used to transmit sensitive information regarding military deployments and battle plans. Once delivered, the devices will make contact with the US military global communications network. In order to comply with the military's security requirements, the contractor must conduct a security risk analysis of its internal networks and information systems for intrusion detection and cyber-crime prevention. Note that the contractor is performing a security risk assessment of its own network and system and not of the military network. After all, a breach of security of the contractor's computer systems could compromise confidential and sensitive military information. You have been asked to head up the project team that will ultimately perform this security assessment and analysis.

Tasks:

Create a 6- to 8-page report on the following aspects:

Distinguish what techniques should be used to start the investigation. For example, identify who should be interviewed first, determine what type of log files to review, and/or identify methods that should be used to preserve the integrity of the evidence.

Identify at least ten potential threats, at least ten vulnerabilities, and at least ten risks (a minimum of thirty). For each item, provide rationale to your selections and any assumptions you made.

Choose which type of risk-analysis methodology should be used (quantitative, qualitative, or any other methodology). Justify your decision.

Out of all the potential risks that you previously identified, select the top three that are of most concern to the organization. Justify your reasoning.

Outline and explain at least two (in total) applicable federal, state, or other related legislations that could help reduce potential risks and prevent cyber-crime activities.

Note: You may consider referring to these two websites for guidance on federal legislation and standards:

https://csrc.nist.gov/publications/PubsFIPS.html

https://csrc.nist.gov/publications/PubsSPs.html

Your final product will be in a Microsoft Word document approximately 6-8 pages in length and utilize at least three scholarly or professional sources (beyond your textbook) in your research. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Reference no: EM131360964

Questions Cloud

How creative thinking styles can potentially create conflict : Consider how different creative thinking styles can potentially create conflict among teams. You can review the five personality traits that were covered in a previous course by referring to the Digman article in the Optional Resources this week.
The default risk premiums on the bonds issued : A Treasury bond due in one year has a yield of 5.7%; a Treasury bond due in 5 years has a yield of 6.2%. A bond issued by Ford Motor Company due in 5 years has a yield of 7.5%; a bond issued by Shell Oil due in one year has a yield of 6.5%. The defau..
What type of music did you use and why : In what ways have you used music to change your state of being, such as your mood, your energy, or stress level? What type of music did you use and why
Name four types of information bias : Name four types of information bias. Name at least one way in which each type of bias can be prevented or minimized.
Explain what technique should be used to start investigation : Organizations of all sizes should be concerned with the security and confidentiality of their electronic data. Cyber crimes affect individuals and companies alike. However, companies typically have more financial and other assets that can be compr..
What is the required rate of return on this stock : Proxicam, Inc., is expected to grow at a constant rate of 6.00 percent. If the company’s next dividend, which will be paid in a year, is $1.74 and its current stock price is $22.35, what is the required rate of return on this stock?
How a christian worldview can make sense of trends : write a 250-word thread explaining the ways in which such contemporary issues resonate with American identity and how a Christian worldview can make sense of these trends
Stocks of similar risk have effective annual rate of return : Davy Jones is considering the purchase of stock in Giant Squid Inc. knowing that stocks of similar risk have an effective annual rate of return of 14%. Giant Squid Inc. intends to pay quarterly dividends, with the first dividend of $1 occurring in tw..
Determine the standard deviation : Determine the standard deviation using Sheppard's Correction. (Usr four points of percision.)

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd