What is cyber security and what are some of its key concept

Assignment Help Computer Network Security
Reference no: EM13759807

Scenario: You are an information system security professional for CCS International, a company that provides IT personnel for a variety of government and private contracts. The organization to which you are currently contracted hires a new chief security officer (CSO) after the previous CSO retires. Although the new CSO is in charge of security for the organization's data assets, networks, and computer systems, her background and most recent experience is in physical security, and she knows very little about information security. Your manager explains that you have been assigned the task of preparing an information brief for the new CSO, which will provide her with the basics of cyber security, acquaints her with the current threats facing your organization's data infrastructure, and the legal issues related to protecting the enterprise.

Prepare a slide presentation covering (at a minimum) the following topics:

What is cyber security, and what are some of its key concepts?

What are the most significant threats to your data, and what are some of the root causes of those threats?

Are cyber criminals a real danger to your enterprise? Why or why not?

What is risk management, and how can the risk management process help you protect your infrastructure and data?

What are some computer security best practices that you would recommend, and how will they help protect your IT assets?

If your organization does become a victim of a cyber-crime or a security incident, how will you respond? What types of evidence would be important to your investigation, and how would they be used?

What would law enforcement's role be in your incident response plan?

Are there any laws at the local, state, federal, or even international level that protect your organization by imposing penalties on cyber criminals?

Provide at least one example of a cyber-crime court case, and explain both its outcome and its significance. What do you need from the CSO to best protect your organization? Justify your requests.

 

Reference no: EM13759807

Questions Cloud

The cost estimation to design a new aircraft : Boeing has developed the 787 for production in 2008*. It is expected to perform 20% more efficiently than any other plane. Assume the passenger load is similar to the Boeing 777 (which cost $6 billion to design and went into service in 1993). The BLS..
Obtained fixed and unit variable cost in formation : Jimbo Elrod has obtained fixed and unit variable cost in formation of four potential locations for his professional wrestling school and summarized it in the table below. All values are in dollars. Jimbo plans to charge the same amount for tuition re..
Calculate average cost per unit : Determine the cost of goods available for sale. Calculate average cost per unit. Determine (1) the ending inventory, and (2) the cost of goods sold under each of the assumed cost flow methods (FIFO, LIFO, and average-cost). Prove the accuracy of th..
What is cyber security and what are some of its key concept : What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats
Describe the indian reorganization act or indian new deal : Describe the Indian Reorganization Act or "Indian New Deal"? In what ways was it a departure from previous policy? How did it change thinking about the place of Indians in American society? How did it influence subsequent policies towards Native A..
Union-management relations instructions : Video Case: Union-Management Relations (UPS) Instructions: Read the video case in your textbook, titled Union-Management Relations (UPS), and then watch the corresponding video in the Unit Study Guide.
The hundreds of personality traits o : The hundreds of personality traits on which individuals differ have been organized into five basic factors, called the "Big Five" personality traits. In this discussion we will explore these concepts further.
Write a five page paper on hobbes leviathan : Write a 5 page paper on Hobbes' Leviathan explaining the formation of the state. A well-written paper will clearly address the questions.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd