What actions can cag take to limit a ransomware attack

Assignment Help Computer Engineering
Reference no: EM133571320

Problem

Robert Celinszky, CEO of The Celinszky Automotive Group (CAG), a chain of 25 dealerships across four southern states, has distributed a video to all members of the organization expressing his concern about the mounting threat of ransomware on the automotive sector. Although CAG has not yet suffered an attack, the CEO perceives ransomware as an existential threat to the organization. To help address the CEO's call to action, CAG's Chief Information Officer (CIO) authorized the hiring of additional staff. You have just started in a new position at CAG as a Cybersecurity Vulnerability Analyst (CVA).

As you settle in for your first full week of work, your manager drops by for a chat. She tells you that the CIO put her in charge of CAG's ransomware preparation project. Her background is in traditional IT, but she has heard about ransomware in the news. She also mentioned that a family member was recently impacted during a hospital stay in which medical staff could not access health records. She's eager for you to get started to avoid a similar situation at CAG. Your first task is to provide some background questions to help your manager get up to speed. She has asked for your ideas by the end of the day.

Choose one of the questions:

Question 1) What would you communicate to your manager?

Question 2) What are the top three items you think CAG should prioritize for implementation to mitigate ransomware attacks?

Question 3) How would CAG know when a ransomware attack is underway or has already occurred?

Question 4) What actions can CAG take to limit a ransomware attack?

Textbook: Grama, J. L. (2022). Legal and privacy issues in information security (3rd ed.). Jones and Bartlett.

Reference no: EM133571320

Questions Cloud

What steps would your community need to take to achieve : Why is it important for the police to understand the expectations of the police? How can police address these expectations, whether they are in their power
Develop the bill of materials and tabulate it in spreadsheet : Develop the bill of materials and tabulate it in a spreadsheet to include item, description, model number, and approximate cost.
What additional information or access you would need : You are given access to the computer and email account by the parents. Briefly discuss how you should proceed next, including what additional information
What is meant by the term continuum of sanctions : Describe some of the reasons as to why intermediate sanctions are preferred overtraditional incarceration and probation.
What actions can cag take to limit a ransomware attack : How would CAG know when a ransomware attack is underway or has already occurred? What actions can CAG take to limit a ransomware attack?
Which do you think is more persuasive : Which do you think is more persuasive? Explain your answer. Should policy analyses try to deal with the fundamental causes of social problems, such as crime
Will you be treated differently from an unethical hacker : All your tools are legal to possess in the United States but not in the EU. As an ethical hacker, will you be treated differently from an unethical hacker?
How are these systemic issues handled in the prisons : How are these systemic issues handled in the prisons above? What changes could be made to lessen the effects of these issues?
What is the human drain of american prisons : what is "the human drain" of American prisons and how can this be replaced with a "strengths based" approach (describe a strengths based approach)?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a function repeater k that takes a sound and integer k

Write a function repeater K that takes a sound and an integer k as input, and returns the sound repeated k times.

  Calculate the earliest expected completion time

Calculate the earliest expected completion time. What would happen if activity 6 were revised to take 6 weeks instead of 2 weeks?

  Prepare an outline of plausible approaches

IT 535- For this, you must prepare an outline of plausible approaches and an IT solution to address the inventory and overtime issues.

  What does the super keyword represents

What does the super keyword represents and where can it be used? Give an example of a superclass and subclass.

  Implement a function for setting width of displayed ellipses

implement a function for controlling line type tsolid, dashed, dotted of displayed ellipses. Implement a function for setting the width of displayed ellipses.

  Describe your overall reading experience

Describe your overall reading experience. Have your thoughts about the book changed or stayed the same? Why?

  What are the security vulnerabilities

What Is A Hypervisor? Differentiate Between Type I And Type II. What Are The Security Vulnerabilities Of Each? Write a short paper of at least 500 words.

  Task - implement a few basic networks

CS 3600 Assignment: Probability. Your task is to implement a few basic networks as well as several sampling algorithms. You will do this in probability notebook.ipynb, and there are tests along the way to help. Unlike previous assignments

  Describe the database

Describe the database, and how it is used to support business or personal functions

  Why e-mail become a critical component for ig implementation

From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most comm on business.

  Definition of artificial intelligence

Most of the posts I have looked at from other classmates start with some definition of Artificial Intelligence

  Create an manages a 2d array of ints

Creates an manages a 2d array of ints. It has a constructor that takes a 2d array as a parameter and assigns it to the instance variable.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd