Should cybertech remain on both the opm breach investigation

Assignment Help Basic Computer Science
Reference no: EM131602070

Early one morning at work, CEO Alice Johnson asks if you have a moment to chat. I need your expertise and advice on a complicated situation for the company regarding an international hacking lawsuit.

In her office, Alice explains that CyberTech is serving as the cyber forensics consultant for a law firm handling the suit from a 2015 hack of the Office of Personnel Management, OPM.

The OPM hack compromised background information on millions of workers. In a related case Anomalous, a non-US gray hat hacking group suspected in the OPM breach case, is claiming that US-based Equation Set attempted to hack its facilities.

So we have a non-US and a US set of test hacker groups involved. With Anomalous, the non-US group, being a client defendant in one case against Equation Set, the US group, and as a suspect in the OPM breach.

But Alice then outlines why the case is problematic. Along with the OPM victims, CyberTech represents clients from some of the OPM breach suspect companies in unrelated cases, which could appear to be a conflict of interest.

This could affect the way our company is perceived by others. We need to maintain our image as an unbiased cyber security consultant.

Should CyberTech remain on both the OPM breach investigation and the overseas case at the same time? Or should we drop one of the cases?

Apply your critical thinking and analytical skills to figure out what happened what we know and don''t know, and how the company might remedy this situation. I''d like a paper by the end of the week with your recommendations.

Reference no: EM131602070

Questions Cloud

Estimate the price of royal ranch house stock : What do you estimate the price of Royal Ranch House stock will be at that time?
Visual basic-polymorphism-overriding : Define and explain the function of polymorphism and overriding. In your description, provide an example for polymorphism as well as overriding.
What would be a good retirement : What are three social problems where the family in later life might help society? What might these programs do, and what challenges would they face?
Define white-collar crimes are defined as nonviolent : White collar crime is any illegal act committed by concealment or guile, rather than physical means, to obtain money or property
Should cybertech remain on both the opm breach investigation : Should CyberTech remain on both the OPM breach investigation and the overseas case at the same time? Or should we drop one of the cases?
Business has encountered an event : Look up and research an instance where a business has encountered an event (disaster, hack, environmental issue, etc.) and provide a brief synopsis.
Explain how popular culture has no fixed forms : Explain how popular culture has "no fixed forms". What does this mean? Given the problematic nature of studying popular culture.
Describe two provisions of the energy policy act of 2005 : Explain how these scientific laws apply to energy use, energy conversions, and the need for energy efficiency.Describe two provisions of the Energy Policy Act .
Define a robbery consists of six of the elements : A robbery consists of six of the following elements Taking away and carrying away of personal property of another, with the intent to deprive permanently

Reviews

len1602070

8/16/2017 3:07:33 AM

Should CyberTech remain on both the OPM breach investigation and the overseas case at the same time? Or should we drop one of the cases? Apply your critical thinking and analytical skills to figure out what happened what we know and don''t know, and how the company might remedy this situation. I''d like a paper by the end of the week with your recommendations.

len1602070

8/16/2017 3:07:25 AM

Early one morning at work, CEO Alice Johnson asks if you have a moment to chat. I need your expertise and advice on a complicated situation for the company regarding an international hacking lawsuit. In her office, Alice explains that CyberTech is serving as the cyber forensics consultant for a law firm handling the suit from a 2015 hack of the Office of Personnel Management, OPM.

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd