What are the most significant threats to your data

Assignment Help Computer Network Security
Reference no: EM13667323

Read the following scenario and use it as the basis for your answers to the associated essay questions:

Scenario

You are an information system security professional for CCS International, a company that provides IT personnel for a variety of government and private contracts. The organization to which you are currently contracted hires a new chief security officer (CSO) after the previous CSO retires. Although the new CSO is in charge of security for the organization's data assets, networks, and computer systems, her background and most recent experience is in physical security, and she knows very little about information security. Your manager explains that you have been assigned the task of preparing an information brief for the new CSO, which will provide her with the basics of cyber security, acquaints her with the current threats facing your organization's data infrastructure, and the legal issues related to protecting the enterprise. Prepare a slide presentation covering (at a minimum) the following topics:

  • What is cyber security, and what are some of its key concepts?
  • What are the most significant threats to your data, and what are some of the root causes of those threats?
  • Are cyber criminals a real danger to your enterprise? Why or why not?
  • What is risk management, and how can the risk management process help you protect your infrastructure and data?
  • What are some computer security best practices that you would recommend, and how will they help protect your IT assets?
  • If your organization does become a victim of a cyber-crime or a security incident, how will you respond? What types of evidence would be important to your investigation, and how would they be used? What would law enforcement's role be in your incident response plan?
  • Are there any laws at the local, state, federal, or even international level that protect your organization by imposing penalties on cyber criminals? Provide at least one example of a cyber-crime court case, and explain both its outcome and its significance.
  • What do you need from the CSO to best protect your organization? Justify your requests.

Assignment

Prepare a 15- to 20-slide presentation addressing the scenario and covering the topics above. Ensure that you create a title slide for your presentation (not included in the 15- to 20-slide count) displaying your name, the course title, and the date of submission. Be sure to use a background and fonts appropriate for your meeting with the CSO.

Prepare a script to go along with the slide presentation that could be read to provide an in-depth discussion of the topics highlighted on the slides. Research the topics above, using your textbook, information provided in class, and resources provided by the UMUC library or textbooks from previous courses. Your script should be written in an academic format, should be logically organized (e.g., introduction, body, and conclusion), and should include the following:

- a cover page with your name, the course title, and the date of submission

- an introductory section that explains the purpose of the presentation

- the body of the paper, addressing the topics discussed in your slides

- a conclusion section that summarizes your discussions

- a References page in which you reference the text or other sources, which must be properly documented and cited, using APA formatting

The script must be a minimum of 10 double-spaced, computer-generated pages in length, using a 12-point font, with 1-inch page margins (top, bottom, right, and left). There must also be a cover page and a References page; these two pages will not count toward the required page total.

Verified Expert

Reference no: EM13667323

Questions Cloud

Find the power delivered by the person pulling on the rope : A 6.2 kilogram box is being lifted by means of a light rope that is threaded through a single, light, frictionless pulley that is attached to the ceiling. find the power delivered by the person pulling on the rope
Determine the tension in the string at instant of projection : A particle of mass 3 kilogram is attached to the end of a ring of length 4meter, whose other end is fixed. determine the tension in the string at the instant of projection
How does the leadership respond : How does the leadership respond?
Explain what other properties these solutions have in common : Determine two aqueous solutions one of sucrose and the other of nitric acid. Both solutions freeze at -1.5 degree Celsius. Explain what other properties these solutions have in common
What are the most significant threats to your data : What is cyber security, and what are some of its key concepts and what are the most significant threats to your data, and what are some of the root causes of those threats - are cyber criminals a real danger to your enterprise? Why or why not?
Determine the retarding force acting on the car : A car of mass 1200 kilogram is traveling at 28.0 m/s. Determine the retarding force acting on the car
How political is your organization really : What power structures exist in your organization, and how are they managed? Look at the individuals in positions to do something; how do they act? Those close to the decision-makers, how do they use the power of those they report to? How political is..
Explain what is better for cleaning when a hard water : Explain what is better for cleaning when a hard water is used a soap or a detergent and why
Find how much energy is stored in the capacitor : A 40-pF capacitor is immersed in silicone oil, which has a dielectric constant of 2.6. Find how much energy is stored in the capacitor

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd