Real world it security breach and perform a case study

Assignment Help Other Subject
Reference no: EM131485362

SYSTEM INTEGRITY FOR CYBERSECURITY

Research Paper

Assignment:

Your Assignment is to choose a real world IT security breach, and perform a case study. Within this study, analyze the method the attackers used to gain access, and the actions the attackers took once the network was penetrated. You should also identify the correct security procedures that should have been in place to prevent this breach. The choice of incident is completely up to you, but please keep in mind that it should reflect an actual breach and require research on your part. Please keep in mind that in many situations, details of the attack may not have been revealed due to our culture of corporate secrecy and/or pending litigation, so please choose a case wisely.

Requirements:

Within this case study, please include the attacking methods, the security failures, and a review of the corporate response. Additionally, please indicate a suggested correction to both the security that would have prevented this breach, and indicate any improvements that the company could have made with its corporate response.

The paper should be 7-10 pages in length (minimum 7 page), double spaced, standard font with default margins.

All citations should be made using APA 6th edition guidelines, and please include a minimum of 5 valid citations, although you should remember that any statement of fact that is not common knowledge or "assumed" should be backed up with a citation.

APA 6th edition guidelines

Choosing Research Sources

As this is a cybersecurity course, it is not a requirement that all sources be academic journals or peer- reviewed, as this industry advances far faster than academia. While it isn't a requirement for peer-reviewed work, the quality of the source matters. Here are some simple guidelines, but it is up to each person to evaluate the quality of a source and verify if the data is relevant and accurate.

- Wikipedia is NOT a citable source, but it has excellent data. (HINT: Wikipedia isn't citable, but Wikipedia itself cites its sources, and often those sources are valid).

- Security researcher blogs often are an excellent source, known respected security researches such as Brian Krebs (krebsonsecurity.com) often post incredibly useful information. This doesn't mean all blogs are valid, so I highly recommend confirming any data you obtain from a blog by attempting to find an additional source.

- Security patches and postings by corporations such as Microsoft, Apple, Norton, Mcafee, SANS, etc., are all considered valid and can be used as citations.

Verified Expert

This is an MS Word document which is about the resume & cover letter which needs to be used for the various colleges’ application & for the jobs. This paper talks about the various degrees, services in the various organization & an individual caliber upon which a resume & cover letter has been drafted. It lays emphasis on the job perspective & demand of the various organization accordingly a resume has been outlined & cover letter which provides a synopsis of the professional attributions

Reference no: EM131485362

Questions Cloud

How training-development are seen as different in culture : Write an argumentative essay about How training and development are seen as different in any culture.
Powerhouse capacitors produces capacitors : Formulate the problem of minimizing the total cost, this year, of producing and shipping capacitators to meet all demands from the current three plants.
Calculate the equilibrium price and quantity : The producer of a cosmetic product needs to decide the optimal price to charge and the optimal quantity to supply in the market.
Implementation and integration of the desktop application : CIS8000 Assignment 2 - ENTERPRISE DESKTOP APPLICATION PROPOSAL. Implementation and integration of the application within the existing organizational
Real world it security breach and perform a case study : Choose a real world IT security breach, and perform a case study. Within this study, analyze the method the attackers used to gain access.
Maximize profits for its shareholders : In our free-market economy we commonly hear that a business' is its' primary responsibility to maximize profits for its shareholders.
Methods to answer that question : a) what is the question you are attempting to answer, and b) list the methods to answer that question.
Complete the total and marginal revenue columns : Consider the following Quantity, Price, and Total Cost schedule for a single price monopolist.
Pros and cons of stem cell research : Discuss and lay out the pros and cons of stem cell research, their ethical implications, therapeutic benefits, ethical methods for obtaining stem cells.

Reviews

len1485362

5/5/2017 6:13:22 AM

Citing Sources For this class, all sources must be cited using APA 6th edition format. There are numerous websites that can assist you with this, and some will create the proper works cited format. Feel free to use online resources as much as necessary to assist you.

len1485362

5/5/2017 6:13:02 AM

As this is a cybersecurity course, it is not a requirement that all sources be academic journals or peer- reviewed, as this industry advances far faster than academia. While it isn’t a requirement for peer-reviewed work, the quality of the source matters. Here are some simple guidelines, but it is up to each person to evaluate the quality of a source and verify if the data is relevant and accurate. • Wikipedia is NOT a citable source, but it has excellent data. (HINT: Wikipedia isn’t citable, but Wikipedia itself cites its sources, and often those sources are valid). • Security researcher blogs often are an excellent source, known respected security researches such as Brian Krebs (krebsonsecurity.com) often post incredibly useful information. This doesn’t mean all blogs are valid, so I highly recommend confirming any data you obtain from a blog by attempting to find an additional source. • Security patches and postings by corporations such as Microsoft, Apple, Norton, Mcafee, SANS, etc., are all considered valid and can be used as citations.

Write a Review

Other Subject Questions & Answers

  Diagrams and the equations that you used

1. Needs  to write down all the assumptions that were made in the analysis. 2. Needs to assume that the arch is symmetrical and assume each member is linear instead of Curved to make the calculation very easy. 3. Free body diagrams and the equation..

  What factors are most important in causing political actors

What factors are most important in causing political actors to resort to terrorism?

  How many women-children were working with the constructor

A contractor had employed 100 labourers for a flyover construction task. He did not allow any woman to work without her husband. Also, atleast half the men working came with their wives. He paid five rupees per day to each man, four ruppes to each wo..

  Screening committee to give me ranked recommendations

If I were the vice president for Health Services and have instituted a national search to fill a mid-level management position in my unit and have appointed a search and screening committee to give me ranked recommendations.

  Self disclosure is issue with persons who have disabilities

Discuss how self disclosure is an issue with persons who have disabilities. To whom would this best apply? What is needed for this to be done? Why is it valuable?

  Human error-damage by employees-misuse of computer systems

Select any three of the following security threats described in the textbook (human error, damage by employees, misuse of computer systems, theft, computer-based fraud, viruses, hackers, and natural disasters) and recommend a control for each threat ..

  Simulate the rolling of one dice for each of two people

You will write a program that will simulate the rolling of one dice for each of two people. You will first get the names of the two people who will participate in the game.

  How to apply critical thinking in decision-making process

Describe the forces which are involved in formulation of the problem. Apply critical thinking in decision-making process.

  How the federal bureau of investigations trains agents

Compare and contrast the training method ideologies associated with how the Federal Bureau of Investigations trains agents versus the quasi-militarism (also called para-militarism) characteristic methodology typically used in the typical police ..

  Provide an overview of the effects of substance abuse

Provide an overview of the effects of substance abuse on adolescents from the following perspectives: Explain the importance of treatment, and detail the different types of treatment options available for substance addiction.

  Aspects of human psychology and development

Humans are social beings who interact with others for survival and to achieve goals. Like the other aspects of human psychology and development discussed thus far in this course

  What impact do you want to make in the field of psychology

What impact do you want to make in the field of psychology? What are your passions and areas of interest within psychology? What might you like to learn more about through research and scholarship in the field? What would your practice of psychology ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd