What actions can cag take to limit a ransomware attack

Assignment Help Computer Engineering
Reference no: EM133557326

Case Study: Robert Celinszky, CEO of The Celinszky Automotive Group (CAG), a chain of 25 dealerships across four southern states, has distributed a video to all members of the organization expressing his concern about the mounting threat of ransomware on the automotive sector. Although CAG has not yet suffered an attack, the CEO perceives ransomware as an existential threat to the organization. To help address the CEO's call to action, CAG's Chief Information Officer (CIO) authorized the hiring of additional staff. You have just started in a new position at CAG as a Cybersecurity Vulnerability Analyst (CVA).

As you settle in for your first full week of work, your manager drops by for a chat. She tells you that the CIO put her in charge of CAG's ransomware preparation project. Her background is in traditional IT, but she has heard about ransomware in the news. She also mentioned that a family member was recently impacted during a hospital stay in which medical staff could not access health records. She's eager for you to get started to avoid a similar situation at CAG. Your first task is to provide some background questions to help your manager get up to speed. She has asked for your ideas by the end of the day.

Questions: Choose one of the questions below. What would you communicate to your manager?

  • What are the top three items you think CAG should prioritize for implementation to mitigate ransomware attacks?
  • How would CAG know when a ransomware attack is underway or has already occurred?
  • What actions can CAG take to limit a ransomware attack?

 

Reference no: EM133557326

Questions Cloud

What are some theoretical explanations for gender bias : What are some theoretical explanations for gender bias, violence against women, and repression of women?
How is food a part of a society personality : How is food a part of a society's "personality"? What do these foods in particular say about U.S. culture?
How can we leverage animation in the visuals we present : What considerations should we make with a dark background color? How can we leverage animation in the visuals we present?
How does age influence intelligence : How does age influence intelligence? Cite specific studies that examine measures of intelligence over the life course.
What actions can cag take to limit a ransomware attack : What are the top three items you think CAG should prioritize for implementation to mitigate ransomware attacks? How would CAG know when a ransomware attack
Examples of social-justice cases : Give an example of two (2) social injustices you have learned about in certain schools or districts that stem from systems' issues.
How does your research process differ when using online : How does your research process differ when using online resources versus library databases? Did you have trouble finding relevant information in a library
Explain about data visualization in the projects : Explain about data visualization in the projects and how can it help to analyze the project like child safe. Also what methods are used for data visualization
Why waste time studying many programming languages : Why waste time studying many programming languages when you can just learn how to code in one specific language?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are the ethical considerations with ai in society

CS 5170 Northeastern University, What is the history behind AI? What are the developments have been so far and What are the ethical considerations with AI

  How are frontend and backend development different

Frontend and Backend are the two most popular terms used in web development. How are Frontend and Backend development different

  Discuss problem of a stainless steel spherical tank

A stainless steel spherical tank, with an inner diameter of 3 m and a wall thickness of 10 mm, is used for containing a solution undergoing an exothermic.

  Important role in the safety of autonomous vehicles

Describe two ways in which this is the case. One of the ways should involve a smart phone that is not in the vehicle itself

  Allow the user to enter the size of the matrix such as n

Write a C++ program that Allow the user to enter the size of the matrix such as N.

  What kinds of change efforts are going on in your

organizations undergo planned or unplanned changes to evolve to a newer and better level in their life cycle. these

  How threats are modeled and assessed in cybersecurity world

In 50 to 100 words, explain in your own words how threats are modeled and assessed in the cybersecurity world.

  Define what is a statistical database

What is a statistical database. Why might it be necessary to deny certain overlapping queries from such databases

  Write the program to simulate the number of picks needed

Write the program to simulate the number of picks needed to get four cards from each suit and display the four cards picked.

  How well trained do guards and other employees appear to be

How do these access controls change at night when workers are absent? How well trained do guards and other employees appear to be?

  Calculate the average monthly rainfall

Calculate the average monthly rainfall and then find the month with the most rainfall and the month with the least amount of rainfall.

  In what ways itil framework minimize the impact of change

ITIL stands for the Information Technology Infrastructure Library. ITIL is the international de facto management framework describing "good practices" for IT Service Management.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd