What caused the cyberattack

Assignment Help Computer Network Security
Reference no: EM131863434

Please number responses when answering

1. Enterprise Systems

The executive management team of a medium-sized business wants to be more customer focused in the marketplace. Because you oversee the CRM, you have been assigned to support the newly-created social media marketing plan:

· What are the best steps to identify customers and the different ways they use to contact your company? Defend your answer.

· Explain to the executive management team how the steps you recommended will be incorporated in the organization's ERP.

2. Cybersecurity and Risk Management

Identify one cyberattack that occurred in the last 2 years. What caused the cyberattack? How did the cyberattack impact data loss, financial loss, cleanup cost, and the loss of reputation?

If you were the manager of this company, what are some key steps you would have taken to prevent cyberattacks and enhance cybersecurity?

Recommend information that should be in the cloud and describe which information should not be in the cloud. Be sure to include in your recommendation your thoughts on preventing cyberattacks, addressing security concerns, or strengthening network infrastructure.

3. Cybersecurity

You may have noticed that when you look at products on a search engine, that same product appears as an advertisement in your social media and other sites you visit. Many search engines provide advertisers with tools for evaluating the impact of different keywords or phrases.

These tools typically "track" user behavior patterns and associate products for sale by companies that subscribe to and pay for their services to help identify potential customers. On the other hand, there are also ad-blockers that block this type of communication.

What constraints, if any, should be applied to this practice? Do not repeat ideas that have been posted by other students.

If you are the CIO or an executive manager at a small company that depends on this type of advertising to generate revenue, how might this affect your feelings toward the technology?

Reference no: EM131863434

Questions Cloud

Disadvantages of automating a manual accounting system : Imagine you are a consultant hired to convert a manual accounting system to an automated system. Provide a rationale for your response.
Describe physical and cognitive changes typical of midlife : Describe the physical and cognitive changes typical of midlife. You will also identify the challenges faced by the sandwich generation
What is the amount of the operating cash flow : The tax rate is 34 percent and the profit margin is 6 percent. The firm has no interest expense. What is the amount of the operating cash flow?
What are advantages and disadvantages of ambush marketing : What are the advantages and disadvantages of ambush marketing? What was Bavaria Beer hoping to achieve through its ambush marketing tactics?
What caused the cyberattack : If you were the manager of this company, what are some key steps you would have taken to prevent cyberattacks and enhance cybersecurity?
What is the npv of this project if the discount rate : An investment project has an installed cost of $518,297. The cash flows over the four-year life of the investment are projected
Calculate company predetermined overhead application rate : Job no. 2077 was completed in January 2002, and there was no work in process at year-end. All jobs produced during 2002 were sold with the exception of Job no.
What is the best estimate of sage construction company : What is the best estimate of Sage Construction Company 's cost of equity? Explain why you picked this estimate?
What is mary effective annual rate : She sold all stocks today for $47.19. During that period the stock paid dividends of $2.07 per share. What is Mary's effective annual rate?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Briefly compare and contrast steganography and cryptography

Briefly compare and contrast steganography, cryptography, and digital watermarking. Determine two strengths and weaknesses of each based on their similarities and differences.

  Network security and access control

Network Security and Access Control-You are a senior network security professional at your company. Your company has 150 employees

  Using vigene table to find key used to encrypt message

You were given the following plaintext and cipertext, and you are needed to find key used by them. plaintext: Using Vigene table, find key used by them to encrypt the message.

  Information security for document management systems

The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confide..

  Define the principle of defense in depth

Define the principle of defense in depth. Give two examples of how the principle might be applied: one describing security measures across multiple layers of security architecture, and another describing security measures within a single layer

  Company financial embezzlement cases

Article topic ideas: Information breaches (these will be the vast majority), disgruntled employee cases involving data theft or leaking of information and company financial embezzlement cases that are directly related to IT

  Discuss the type of encryption

Identify the key reasons for selecting your wireless home router. Discuss the type of encryption it uses and explain the reason(s) why you believe this method of encryption is more superior than its contemporaries.

  Pros and cons of out-of-band network management

Write a 2- to 3-page paper describing the pros and cons of out-of-band network management as opposed to in-band network management.

  Explain what the control helps mitigate in a scada system

Select one control, identify whether the control falls under Management, Operational or Technical Controls and explain what this control helps mitigate in a SCADA system?

  Define the security strategies of defense in depth

In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy

  Summarize differences and similarities between wep and wpa

Summarize the main differences and similarities between WEP and WPA. Is one considered more secure than the other? Why or why not? Please explain.

  What are the security concerns related to email security

What are the security concerns related to email security? First, evaluate the risks and potential consequences associated with an email security breach.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd