What is cyber security and what are some of its key concept

Assignment Help Computer Network Security
Reference no: EM13759807

Scenario: You are an information system security professional for CCS International, a company that provides IT personnel for a variety of government and private contracts. The organization to which you are currently contracted hires a new chief security officer (CSO) after the previous CSO retires. Although the new CSO is in charge of security for the organization's data assets, networks, and computer systems, her background and most recent experience is in physical security, and she knows very little about information security. Your manager explains that you have been assigned the task of preparing an information brief for the new CSO, which will provide her with the basics of cyber security, acquaints her with the current threats facing your organization's data infrastructure, and the legal issues related to protecting the enterprise.

Prepare a slide presentation covering (at a minimum) the following topics:

What is cyber security, and what are some of its key concepts?

What are the most significant threats to your data, and what are some of the root causes of those threats?

Are cyber criminals a real danger to your enterprise? Why or why not?

What is risk management, and how can the risk management process help you protect your infrastructure and data?

What are some computer security best practices that you would recommend, and how will they help protect your IT assets?

If your organization does become a victim of a cyber-crime or a security incident, how will you respond? What types of evidence would be important to your investigation, and how would they be used?

What would law enforcement's role be in your incident response plan?

Are there any laws at the local, state, federal, or even international level that protect your organization by imposing penalties on cyber criminals?

Provide at least one example of a cyber-crime court case, and explain both its outcome and its significance. What do you need from the CSO to best protect your organization? Justify your requests.

 

Reference no: EM13759807

Questions Cloud

The cost estimation to design a new aircraft : Boeing has developed the 787 for production in 2008*. It is expected to perform 20% more efficiently than any other plane. Assume the passenger load is similar to the Boeing 777 (which cost $6 billion to design and went into service in 1993). The BLS..
Obtained fixed and unit variable cost in formation : Jimbo Elrod has obtained fixed and unit variable cost in formation of four potential locations for his professional wrestling school and summarized it in the table below. All values are in dollars. Jimbo plans to charge the same amount for tuition re..
Calculate average cost per unit : Determine the cost of goods available for sale. Calculate average cost per unit. Determine (1) the ending inventory, and (2) the cost of goods sold under each of the assumed cost flow methods (FIFO, LIFO, and average-cost). Prove the accuracy of th..
What is cyber security and what are some of its key concept : What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats
Describe the indian reorganization act or indian new deal : Describe the Indian Reorganization Act or "Indian New Deal"? In what ways was it a departure from previous policy? How did it change thinking about the place of Indians in American society? How did it influence subsequent policies towards Native A..
Union-management relations instructions : Video Case: Union-Management Relations (UPS) Instructions: Read the video case in your textbook, titled Union-Management Relations (UPS), and then watch the corresponding video in the Unit Study Guide.
The hundreds of personality traits o : The hundreds of personality traits on which individuals differ have been organized into five basic factors, called the "Big Five" personality traits. In this discussion we will explore these concepts further.
Write a five page paper on hobbes leviathan : Write a 5 page paper on Hobbes' Leviathan explaining the formation of the state. A well-written paper will clearly address the questions.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Difference between a stream cipher and a block cipher

What is your understanding of the difference between a stream cipher and a block cipher?

  Security weaknesses

In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses

  Write a 2- to 3-page paper describing your companys

write a 2- to 3-page paper describing your companys intranet.include how the information is laid out and what security

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

  Explain rsa public-key encryption scheme

Consider the plain (i.e., non-padded) RSA public-key encryption scheme. Encrypt the message m = 12 using the public key pk = (N,e), where N = 35 and e = 3.

  Uniform law for computer information transactions

After more than ten years of proposals, revisions and re-revisions, the National Conference of Commissioners on Uniform State Laws at long last voted to adopt the Uniform Computer Information Transactions Act on July 29.

  Explaining level of cyberphobia in workplace

After completing the Unit reading on the subject, give your sense of the level of cyberphobia in the workplace and your suggestions on dealing with it as an IT manager.

  Write a program in to find the largest value of k

Write a program in to find the largest value of k such that there exists a k-core in a given undirected graph G = (V, E). Also print out the nodes in the largest k-core.

  Sarbanes-oxley act

Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: Sarbanes-Oxley Act

  How a company-wide policy program could help the situation

Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

  Creates for system forensics investigators

Explain why you believe the trend of threats targeting large enterprises is rising and what you believe is the greatest tool these hackers have at their disposal. Provide a rationale.

  Is there a significance to caribbean island of nevis

Does it have the characteristic of being one way or can this number be end result of some other rule if so which rule?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd