How has your view about cyber security overall changed

Assignment Help Management Information Sys
Reference no: EM132071287

Title Page (1 page)

Title: Create a Title for your Paper

Authors: List Authors' Full Names

Section 1. Attack Summary(2 page, double spaced)

· Introduce the cyber incident

· State what your group knew about this attack before starting the paper (even if it's nothing that's fine)

· Describe how the attack works.

· Describe what types of systems and or software are affected

· Describe the overall impact of the attack (could be information like number of countries impacted, number of companies impacted, number of people impacted)

· Describe how it impacts organizations, companies or people (for example, may it causes a denial of service and companies can't use certain systems, maybe it causes all Windows programs to shutdown etc.)

· Describe other interesting things you have found about this incident.

· Use 8 references

Section 2. Visual Representation (1 page, double spaced)

· Provide a high level visual either about how the attack works or that shows the impact of the attack (if can be a graph, a map or some other visual). Remember to cite the source.

· Describe the visual in at least 3 sentences.

Section 3. Table (1 pages, double spaced)

· Create a table consisting of ten pieces of the most interesting information you found out about the cyber incident. You pick the fields that go into the table; you can use things from section 1 as a guide.

Section 3. Group Reflection (1 page, double spaced)

· DO NOT USE ANY SOURCES FOR THIS PART.

· Answer this question: how has your view about cyber security overall changed because of what you learned from your topic? Do not explain concepts to me.

Examples could be: your group is more scared than it was before, or maybe your group is now more aware that cyber attacks can spread more quickly or maybe your group feels that no one is truly safe from cyber attacks...

Section 4. References (1 page)

· List references in APA format.

Presentation Guidelines:

· PPT requirements

· Title slide: all group members who were present at the residency

· Introduction slide: state the name and overall description of the attack

· Impact slide: what were the high level impacts (number of countries, companies and/or individuals impacted), costs incurred because of the attacks etc.

· Attack description slide: describe how the attack works

· Systems/software impact slide: state what systems and/or software are impacted

· Interesting points: describe three most interesting things about your attack that your group found

· Group reflection: how has your group's view about cyber security or attacks changed because of this assignment

· Reference slide: reference list from your paper can be put here

· Presentation tips:

· 10 minutes long

· Limit the text on the slides, do not read slides

· Use visuals as much as possible vs text

· Any group member should be able to give the PPT, make sure each group member has learned about the topic

· Only one group member needs to present the PPT; the group members who do not present will be asked a question by the professor

Reference no: EM132071287

Questions Cloud

Would you consider implementing an enterprise resource : When you started your small business, you managed all business processes on your own.
Calculate the present value of the cash savings : Interest is 10%. Assume the cash savings occur at the end of each year. Calculate the present value of the cash savings
Describe how the attack works : Describe how the attack works. Describe what types of systems and or software are affected
How would compose a team for completing a course : How would compose a team for completing a course/work project in terms of the three dimensions listed above.
How has your view about cyber security overall changed : How has your view about cyber security overall changed because of what you learned from your topic? Do not explain concepts to me.
Declining trust in the health care system : Health reform is mired in the morass of multitier payment systems and multiple modes of access, limited by the ability to seek and to pay.
Explain some of the fire protocols that should be implement : Fire is one of the most devastating elements that can destroy the physical components of an entity quickly.
Discuss how to access team productivity : Discuss how to access team productivity: What conditions need to be in place for teams to excel and why?
Speculate on the prominent reasons general dynamics : Speculate on the prominent reasons General Dynamics selected the agile framework they did to use in this project.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How process and business strategic decisions

How process and business strategic decisions can be made together

  What clues are provided about the results of a search

Nearly everyone has done an Internet search, but what clues are provided about the results of a search?

  Define utility and cloud computing services

Define utility and cloud computing services, and indicate where these services might replace or augment the initial system design.

  Discuss the e-commerce implementation plan

Update previously completed sections based on your instructor's feedback.

  Compare and contrast physical and internetwork threats

Determine the potential repercussions of a professional not understanding these models and the affect it could have on their duties.

  Briefly describe the enterprise in terms of its operations

Illustrate how its e-commerce or ERP implementation integrated with related CT (information and communication technologies- data mining. business htelligences. data ware house. databases. internet. RFID. VAN. EDI)?

  Explain how does data leakage occur in an organization

The focus of the research paper is Data Leakage. How does data leakage occur in an organization? What are the common causes of this problem? How would use address this troublesome trend?

  Analyze it change management

Analyze IT change management and patch management processes needed within organizations.

  What is the role of business intelligence

Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?

  What were the potential conflicts and incompatible functions

What might be some difficulties that come about with administering Bob's access? What were the potential conflicts and incompatible functions in Alex's access account authorizations

  Write in a brief about knowledge management systems

Write in a brief about Knowledge management systems and definition and What is the system about?

  Explain the accounting requirements

Explain one way that accounting requirements can be incorporated into the information systems and why they need to be updated regularly.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd