Reference no: EM131046280
Cyber Security
For this assignment, imagine that you are a cybersecurity consultant hired to identify the most significant cybersecurity threats to a company. You can choose any of the following companies:
Amazon
Boeing
Cisco
Costco
Comcast
Exxon-Mobil
Wells-Fargo Bank
Your local electric utility
Your local hospital
If you want to choose a different company, ask and you may be allowed to. Just be sure to ask early enough.
Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the company. You memo should describe the threat and who the threat would be coming from (e.g., competitors, disgruntled employees, foreign governments, etc.). You should mention if similar attacks have happened against other companies, since that would be more likely to cause the CEO to pay attention.
Keep in mind that the audience for this memo is a CEO. Don't tell the CEO that the company's webserver is susceptible to SQL injection - they don't know what that means and they don't need to. That's a topic for a memo to someone much lower in the company.
Also, don't try to tell the CEO what they should be doing to prevent the threats, just tell them about the threats. If they are happy with your work, you will get a follow-on contract where you can provide suggestions for what they can do to prevent them, but not now.
The format of the memo must follow the instructions found in the ADMG385MemoFormatting.pdf file (located in the week 5 module).
If you've taken ADMG 385 you've probably seen this. Note that the document is both instructions for how to write a memo, and an example of a memo. And notice how the memo is broken into paragraphs. Some students seem to have great difficulty breaking their writing into paragraphs, but it is much easier to read in smaller paragraphs. Do it!
If you have letterhead that you can write your memo on, either from another class or from your own business or wherever, great, use it. Professional letterhead always makes a memo look better, and you are a professional cybersecurity consultant. But letterhead is not required for the assignment.
In the memo, the "To" line should not have my name in it, nor should the memo reference this class. Write it as a memo to the CEO of the company you have chosen.
The body of the memo must be at least 400 words long.
This assignment is worth 5 points total:
The content of the body of the memo. Do you clearly describe the threats so that the CEO can understand? Did you spell check and proof read? If less than 400 words, as usual the maximum score will be reduced proportionately.
The instructions on how to write a memo.
I will be pickier on this assignment than previous ones about spell checking and other errors, The audience for this memo is not your instructor, the audience is a CEO of a corporation that is paying you a crazy amount of money to write this memo. Show them you are worth it and should get that follow-on contract!
Show what happens at t = 0, t = 1, ... , t = 4 seconds
: assume the initial SWS and RWS are 4, the link speed is instantaneous, and the receiver can free buffers at the rate of one per second (i.e., the receiver is the bottleneck). Show what happens at T = 0, T = 1, ... , T = 4 seconds.
|
How dcf techniques are useful in overcoming financial risks
: Explain how DCF techniques are useful in overcoming financial risks at the time of taking investment decision, supporting your answer with an example - Compare between any two brands and their local demand in the market
|
Develop curiosity to generate significant and problematic
: Hopefully, this semester your accompanying research helped you to become more critical consumers of the material you read, and to develop the curiosity to generate significant and problematic questions.
|
An example of a byte/bit sequence that should never appear
: For each of the following framing protocols, give an example of a byte/bit sequence that should never appear in a transmission.
|
Identify most significant cybersecurity threats to a company
: For this assignment, imagine that you are a cybersecurity consultant hired to identify the most significant cybersecurity threats to a company.
|
Fill in the missing entries in the table
: Write the 110 above the second 3 bits of the dividend, and subtract C×q = 101 110, again from the table, from the first 6 bits of the dividend. Keep going in groups of 3 bits. There should be no remainder.
|
Identify the top hr risks that mark french need to manage
: Mark French has called his senior management team in early on a Monday morning about three weeks ago. He handed each of the managers a document titled, Future Directions. Identify the top five HR risks that Mark French and his team will need to man..
|
Designing a sliding window protocol for a 1-mbps
: Assuming that each frame carries 1 KB of data, what is the minimum number of bits you need for the sequence number in the following cases? Assume the speed of light is 3 × 108 m/s.
|
Create a informational report on dodge data services
: Create a 2-3 page professional-looking informational report (stapled; no report covers) on a topic that provides information to Dodge Data Services.
|