Summarize the data incident and potential level of risk

Assignment Help Computer Engineering
Reference no: EM132387825

Assignment: Summary: ABC Company is a manufacturing company that produces new technology that sells online directly to customers and retailers. The system they use is a core transactional Enterprise Resource Planning system called NEDS. NEDS is similar to many core systems that provide integrated applications on a common platform for financials, managing materials, sales distribution, and production planning (similar to Oracle or SAP). NEDS is located in the Netherlands, while ABC Company is located in Florence, Kentucky. On June 15, 2016, James Hurd (ABC's Global Security Director) was notified that NEDS was burglarized during business hours involving individuals stealing equipment including blackberries, iPhones, laptops and hard drives. Local police were notified and the incident was reported on that date. A police report only included identification of specific hardware that was stolen and several bicycles.

The burglary notification that was mailed was sent to a branch office of ABC Company in Mexico. James Hurd was notified by the Mexico office via email which included an attached electronic version of the burglary notification and police report on June 20, 2016. James Hurd recognized that the incident actually occurred 5 days earlier.

The letter contained the following information about the incident:

• The incident occurred in the application area that provides custom application development and reporting for the ABC Company.

• The area that was impacted involved "potential data" used for sales analysis. Data from the ABC Company had been placed on laptops while some diagnostics were being carried out.

• Compromised data could have included customer or retailer information from 2002-2014 consisting of names, address, bank account data or credit card numbers, SKU product numbers, descriptions, quantities, Purchase Order numbers, and purchase price.

You are James Hurd and need to respond to this incident by taking action immediately.

You will need to complete the following:

I. Develop an Incident Response Policy for ABC Company that will be used as your reference for your evaluation of this potential data incident (this is an attachment that should be included in your paper and referenced in your presentation).

II. Upon developing ABC Company's Incident Response Policy, evaluate the incident described above:

- Summarize the data incident and potential level of risk, include why?

- Upon identifying the types of data that could potentially be impacted and what laws/regulations could be in violation of non-compliance if this data was breached

- Develop your action plan to evaluate this data incident (include your rationale for why the steps were necessary)

- Describe how the Incident Response Policy supported your actions

- Identify any issues that made the evaluation more difficult

- Identify areas of future risk mitigation actions should a similar incident occur (look at the gaps or issues with this scenario)

- Close the incident (NOTE: The outcome of the incident did not surface any major risks or data breach to the company but it took the evaluation to get to this conclusion)

This presentation must be support by the research paper.

Please note the following criteria:

Research paper:

• Research Paper must be in APA Style

• Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)

• Must be at least 5 double-spaced pages

• The Policy will be an Attachment and not count toward the 5 Page requirement

• Graphs, illustrations and spreadsheets are allowed, but will not count toward the 5 Page requirement

Grading criteria will include the following as this represents 40% of your grade:

Presentation will be 100 points and based on the following:

Completeness of the Topic (Policy, Processes, Action, Conclusion)

Presentation Delivery

Alignment of policy

Paper will be 100 points:

- Meets Standard Criteria

- Completeness/content

- Incident Risk Policy as Attachment

- Logic of Processes and Actions (Thoroughness)

- Alignment of the Incident Risk Policy components in completing and supporting the evaluation

Reference no: EM132387825

Questions Cloud

Gap between the highest and lowest wages a firm can pay : Some social activists argue that there should be laws that limit the gap between the highest and lowest wages a firm can pay.
Briefly describe each of the performance category : What is MIPS? Briefly describe each of the performance category under MIPS quality payment program
Technology architectures are comprised of various mechanisms : Classic cloud computing technology architectures are comprised of various mechanisms.
Discuss the basic anotomy of an infracture policy : IT infrastructure security policies are represented in many types of policy documents, depending on the organization's network and infrastructure needs.
Summarize the data incident and potential level of risk : Summarize the data incident and potential level of risk, include why? Upon identifying the types of data that could potentially be impacted and what laws.
Discuss the disaster recovery phases : Briefly discuss the disaster recovery phases in chapter 10 and their relation to the lessons learned from Hurricane Sandy article.
Explain the concept of information stores : Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success.
Discover different types of programming careers : This exercise will help you discover different types of programming careers that should help you reach your career goals. You will collect and post your.
Produce an entity-relationship model : Develop a top-down design of the data in the form of an entity-relationship diagram. You should note all assumptions you make about the data and the reasoning

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd