Reference no: EM131473841
Project Management for Technology and System Integrity for Cyber Security Assignment
Assignment Requirements
Project background
Burton Golf Course is a two-year-old signature golf course based in Salisbury. Being unique, the number of memberships is increasing and putting strain on the existing information system. The current system is used only by Accounts Department to process Accounts Payables and Receivables. With the steep increase in the memberships, Bookings and Maintenance the Human Resource department is getting overwhelmed with the paper work. Therefore, there is a need to add these functions to a new system.
You are the Project Leader for Soft Systems Ltd., which has been contracted by Burton Golf Course to undertake this project. You need to advise how to develop the new system in a tightly constrained time period. Specifically, you have been advised that the project can start no earlier than Mon, 7th January 2018 and must be completed by Thu, 22nd May 2018.
You report to Mr. Sherman, the Project Manager for Soft Systems Ltd, who liaises with Burton Golf Course. You will report your progress and plans of the project to Mr. Sherman.
SYSTEM INTEGRITY FOR CYBERSECURITY
Research Paper
Assignment:
Your Assignment is to choose a real world IT security breach, and perform a case study. Within this study, analyze the method the attackers used to gain access, and the actions the attackers took once the network was penetrated. You should also identify the correct security procedures that should have been in place to prevent this breach. The choice of incident is completely up to you, but please keep in mind that it should reflect an actual breach and require research on your part. Please keep in mind that in many situations, details of the attack may not have been revealed due to our culture of corporate secrecy and/or pending litigation, so please choose a case wisely.
Requirements:
Within this case study, please include the attacking methods, the security failures, and a review of the corporate response. Additionally, please indicate a suggested correction to both the security that would have prevented this breach, and indicate any improvements that the company could have made with its corporate response.
The paper should be 7-10 pages in length, double spaced, standard font with default margins. Please include a title page, works cited page, and name the paper "LastnameFirstInitial_ETSC681_Paper2".
All citations should be made using APA 6th edition guidelines, and please include a minimum of 5 valid citations, although you should remember that any statement of fact that is not common knowledge or "assumed" should be backed up with a citation.
Attachment:- project management for technology.rar
What is weston cost of equity capital
: Weston Industries has a debt-equity ratio of 1.1. Its WACC is 8.2 percent, and its cost of debt is 6.4 percent. The corporate tax rate is 35 percent.
|
Review the case study of curran v ciaramelli
: FACTS In March 1998, Plaintiff purchased a Corvette from Defendant for the sum of $8,500 in cash. In April, 1998, after consulting with the local police.
|
Fundamental future growth of facebook
: Give a brief statement about the fundamental future growth of Facebook. What are some qualitative factors that you.
|
How quality is measured in terms of structure and process
: Discuss how quality is measured in terms of structure, process, and outcomes within a health care organization (HCO).
|
System integrity for cybersecurity
: You report to Mr. Sherman, the Project Manager for Soft Systems Ltd, who liaises with Burton Golf Course. You will report your progress and plans of the project to Mr. Sherman.
|
Evaluation of health insurance
: Review the Patient Protection and Affordable Care Act of 2010 and develop a report providing an overview of the law.
|
Business cycles and the general level of interest rates
: What is the relation between business cycles and the general level of interest rates? Why is the relationship this way?
|
Explain the characteristic of california speech or language
: What I would like you to do is pay attention to how Californians speak (yourself included, if you believe you talk like a Californian).
|
Find two articles using a cited references search
: Find two articles using a cited references search-describe this technique and how you used it. Create a reference list of articles found, following APA style.
|