How did the company react when the attack went public

Assignment Help Econometrics
Reference no: EM131053214

You have been hired as a student intern in the IT Department at Athens State University. A current goal of the University is to more fully minimize security threats and prevent breaches. To accomplish this, they have asked you to research the "major hacks" of 2015 to understand technology, information security measures and issues in security management.

YOUR ASSIGNMENT

The IT supervisor has asked you to create a PowerPoint presentation with audio narrations following these guidelines. Research the Office of Personnel Management Data breach or the "OPM Hack" and answer the following questions. Use these questions as a layout for your PowerPoint.

When did the attack take place? (dates)

Describe the methods of attacks on the company and what went wrong with company operations as a result.

Explain the outcome and any serious impacts that the attack had on the company.

Discuss at least three ways the breach(es) could have been prevented.

What was the motivation behind the attack?

How did the company react when the attack went public?

Were there any legal ramifications for the parties' involved (Company, Hackers, Customers, Etc.)? If so, describe them.

Describe which systems the breaches took place in, what data was comprised and how it was used by the hackers?

Has the company implemented any new security measures as a response to the breach? If so, discuss them.

What meaningful measures do you think should be implemented to prevent future attacks?

YOUR SUBMISSION

Create a PowerPoint slideshow to present your plan to Athens State's IT Department. The goal of your presentation is to convince these individuals to invest resources in IT security. It should include the following elements:

Auto narration for each slide with a minimum of 16-22 slides using a professional theme and incorporating the company logo in each slide header.

Background Information on the breach (2-3 slides), include dates of the attacks.

Explain the methods of attacks on the company and the outcomes on the company as a result. Also include possible motives for the attack(s) (3-5 slides).

Illustrate which systems were breached, what data was comprised and how this data was used (3-5 slides)

Describe how the company responded to the attack(s) when made public and if there were any legal ramifications for the involved parties (1-2 slides).

Describe what new security measures the company has implemented since the attacks (3-5 slides).

Discuss in detail at least three ways the attacks could have been prevented (3-5 slides).

Each slide should have a footer with slide numbers and include citations in APA format where necessary.

References, 5 at a minimum, in APA format (1-2 slides)

Reference no: EM131053214

Questions Cloud

Concept of the invisible norm : Define Richard Dyer's concept of the "invisible norm" as it relates to video game avatars. Make an argument for why hate speech is a problem in virtual worlds (consider concepts like disembodiment, anonymity, the online disinhibition effect, etc.)..
Analyse the cash flow statements for the last two years : HI5001 Accounting for Business Decisions. Analyse the Cash Flow Statements for the last 2 years and comment on the cash position of the company. Not just a comment on what but why is more important while analyzing
Write summary of mass shootings are not about mental illness : Write a summary of the articles Mass shootings are not about mental illness by Matthew Cooper and A Canadian with an Intellectual Disability Is Fighting His 46-Cents-an-Hour Wage By Colin Graf.
Exercise sensitivity and professionalism : Taking a patient's reproductive health history requires that the medical assistant demonstrate sensitivity and professionalism. What are some specific steps you can take to exercise sensitivity and professionalism when taking patients' reproductive..
How did the company react when the attack went public : You have been hired as a student intern in the IT Department at Athens State University. A current goal of the University is to more fully minimize security threats and prevent breaches. To accomplish this, they have asked you to research the "maj..
Write down expression for supply curve for individivisual : Write down an expression for the supply curve for an individual domestic headband producer. If there is perfectly free international trade in sweat-trapping headbands, what will be the market price of a headband in the U.S.? How many headbands will b..
Pros and cons regarding the act and practical and political : Discuss the legal pros and cons regarding the Act and the practical and political realities associated with ESSA as well as how this is all being affected by the reform. Will your state take advantage of the flexibility from ESSA? If so, what do y..
What is mrp and what are the mrp inputs and outputs : What is MRP? What are the MRP inputs and outputs? Explain the MRP process and give a short example - what are the main goals, supporting goals, and building blocks of JIT?
What method of entering the global marketplace is nissan : What are the benefits for Nissan if it succeeds in expanding to emerging markets like India, Russia, and Indonesia? In addition to income and financial resources, what other elements of the external environment does Nissan need to take into conside..

Reviews

Write a Review

Econometrics Questions & Answers

  Design a simple econometric research project

Design a simple econometric research project

  Multiplicative decomposition method

Multiplicative decomposition method

  Market for cigarettes

The Australian government administers two programs that affect the market for cigarettes.

  Solve the forecast model

Solve the forecast model

  What are the marginal abatement cost functions

What are the marginal abatement cost functions for each of the two areas? Calculate the loss in the two areas due to over-control (for the rural area) and under-control (for the urban area).

  Write the t statistic for testing the null hypothesis

Explain why this model violates the assumption of no perfect collinearity.  Write the t statistic for testing the null hypothesis

  What is economics system

What is economics system? What are the types of economics system? Briefly explain each type of economics system by giving examples of nations that are close to each type

  Multiple choice questions related to market concentration

Determine when a competitively produced product generates negative externalities in production, the industry will,

  Calculating number of units produced by firm

Assume a company has the following production function: Q = 100 K.5 L1 . Currently, the company hires 1,000 workers and employs 100 units of capital.

  Question about mobile commerce

M-commerce also known as mobile commerce is being lumped in with several strategic internet plans. Explain some of the industries that are likely to use mobile commerce and how it is working for them.

  Calculating the average days past due and average flow time

Auto Data manufactures custom engineering testing machine. The following 5-orders are currently in the design department:

  Mechanism of an english auction and second price auction

Briefly discuss the difference between mechanism of an oral or English auction and a Vickrey or second price auction.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd