ISOL631 Operations Security Assignment Problem

Assignment Help Computer Network Security
Reference no: EM132387832

Assignment: ISOL631 Operations Security, University of Cumberlands

Summary: ABC Company is a manufacturing company that produces new technology that sells online directly to customers and retailers. The system they use is a core transactional Enterprise Resource Planning system called NEDS. NEDS is similar to many core systems that provide integrated applications on a common platform for financials, managing materials, sales distribution, and production planning (similar to Oracle or SAP). NEDS is located in the Netherlands, while ABC Company is located in Florence, Kentucky. On June 15, 2016, James Hurd (ABC's Global Security Director) was notified that NEDS was burglarized during business hours involving individuals stealing equipment including blackberries, iPhones, laptops and hard drives. Local police were notified and the incident was reported on that date. A police report only included identification of specific hardware that was stolen and several bicycles.

The burglary notification that was mailed was sent to a branch office of ABC Company in Mexico. James Hurd was notified by the Mexico office via email which included an attached electronic version of the burglary notification and police report on June 20, 2016. James Hurd recognized that the incident actually occurred 5 days earlier.

The letter contained the following information about the incident:

• The incident occurred in the application area that provides custom application development and reporting for the ABC Company.

• The area that was impacted involved "potential data" used for sales analysis. Data from the ABC Company had been placed on laptops while some diagnostics were being carried out.

• Compromised data could have included customer or retailer information from 2002-2014 consisting of names, address, bank account data or credit card numbers, SKU product numbers, descriptions, quantities, Purchase Order numbers, and purchase price.

You are James Hurd and need to respond to this incident by taking action immediately.

You will need to complete the following:

I. Develop an Incident Response Policy for ABC Company that will be used as your reference for your evaluation of this potential data incident (this is an attachment that should be included in your paper and referenced in your presentation).

II. Upon developing ABC Company's Incident Response Policy, evaluate the incident described above:

- Summarize the data incident and potential level of risk, include why?

- Upon identifying the types of data that could potentially be impacted and what laws/regulations could be in violation of non-compliance if this data was breached

- Develop your action plan to evaluate this data incident (include your rationale for why the steps were necessary)

- Describe how the Incident Response Policy supported your actions

- Identify any issues that made the evaluation more difficult

- Identify areas of future risk mitigation actions should a similar incident occur (look at the gaps or issues with this scenario)

- Close the incident (NOTE: The outcome of the incident did not surface any major risks or data breach to the company but it took the evaluation to get to this conclusion)

This presentation must be support by the research paper.

Please note the following criteria:

Research paper:

• Research Paper must be in APA Style

• Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)

• Must be at least 5 double-spaced pages

• The Policy will be an Attachment and not count toward the 5 Page requirement

• Graphs, illustrations and spreadsheets are allowed, but will not count toward the 5 Page requirement.

Reference no: EM132387832

Questions Cloud

Write a report summarizing your research : Your task is to write a report summarizing your research (about 10 pages). The writing should be original. Before you begin writing your report.
Inferential statistics in decision making : Inferential Statistics in Decision Making, have been applied or could be applied, in a practical manner to your current work environment.
What may be occurring with the communication process : What may be occurring with the communication process if the change process begins to fail?
Characteristics of alternative economic system : After considering the characteristics of each alternative economic system coupled with your recently expanded knowledge of our capitalistic economy
ISOL631 Operations Security Assignment Problem : ISOL631 Operations Security assignment help and solutions, University of Cumberlands, assessment help - ABC Company is a manufacturing company that produces.
What information would you need to present your arguments : Suppose you had to justify giving a CEO a 60 percent pay raise to almost $17 million. What information would you need to present your arguments?
Information governance and legal functions : Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas
Gap between the highest and lowest wages a firm can pay : Some social activists argue that there should be laws that limit the gap between the highest and lowest wages a firm can pay.
Briefly describe each of the performance category : What is MIPS? Briefly describe each of the performance category under MIPS quality payment program

Reviews

Write a Review

Computer Network Security Questions & Answers

  Examine two advantages of hardware and software vpns

Examine two advantages of hardware VPNs and two advantages of software VPNs. Select the type of VPN (hardware or software) that you consider the better of the two. Provide a rationale for your response.

  Security threats to mobile devices and counter measures

Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.

  How does anti-virus software detect malware

What is a malware? List four harm that malware can cause to an information system. How does Anti-virus software detect malware. What is the difference between Polymorphic and Metamorphic malware. Explain in details the difference between worm and vir..

  What is a spoofing attack

What is a spoofing attack? Briefly provide two common types of spoofing attacks executed by adversaries to attack access control.

  Create a network schedule using the information

Create a network schedule using the information provided in the exercise, apply resources, and adjust the schedule to eliminate over commitment of resources.

  Determine the greatest security challenge

Determine the greatest security challenge that a network administrator might encounter when troubleshooting issues in secured networks

  What is the minimum password length enforced by the password

What is the minimum password length enforced by the Password must meet complexity requirements policy? What sources could you use as a source to perform the MBSA security scan?

  Describe the importance of communication protocols

Explain the importance of communication protocols. Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture. Explain the usefulness of a traffic analysis.

  Develop paper where you address digital forensics tools

Develop a paper where you address three digital forensics tools in the following categories: availability, pricing, platforms supported, technical strengths and weaknesses, etc

  What role do data warehouses play

What security measures do social websites, like Facebook, take to make sure they abide by all legal requirements and protect the user's privacy

  Implement the secure communication tool

ITNE2002 - Network and Information Security - Victorian Institute of Technology (VIC) - Discuss the challenges that would be encountered in key exchange

  Discuss privacy issues as they are related to computers

Discuss privacy issues as they are related to computers / networks / the Internet. What is privacy? Why is it important? Does the law afford any expectations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd