Reference no: EM132562148
You are part of the Sheriff's Office that supports a mid-size city of 400,000 people. Your jail holds 2,000 prisoners, several of whom are awaiting trial, while others are pending release. Your records system has just been taken hostage through ransomware for bitcoin worth about 5 million dollars. As a result, you have no visibility to who your detainees are or why they are being held. Your jail medical records have also been seized. Because it is a single network, you also realize that the records of your personnel (corrections officers, deputies, and other employees/workers) have also been seized. Last week you fired a worker who was openly disgruntled, you realize that this person had privileged access. Although you are not completely sure, you suspect, that part of your network security was left open, potentially allowing the intrusion. You have been asked to create a solution proposal for the breach.
What is your response?
How do you gain control of your records?
How do you prevent this from occurring again?
Who do you alert?
What privacy compromises may have occurred?
Do you choose to pay the money, and who are you accountable to?
What processes for employee termination and privileged user access need to be in place?
What network defense and offense for information systems can you implement?
What Privileged Access Management options need to be implemented to prevent future risks?
How did the change in your thinking happen and why
: Have you changed your mind between different theories, approaches, or "schools of thought" in your work? How did the change in your thinking happen and why?
|
Do americans generally believe that federal government
: Do Americans generally believe that the federal government has too much power, not enough power, or about the right amount of power?
|
Determine and interpret the absolute and relative margin
: Determine and interpret the absolute and relative margin of safety assuming that the company is currently selling 16,000 units annually.
|
How to compute the eac for both machines
: Assume a salvage value of $55,000. If your tax rate is 24 percent and your discount rate is 11 percent, compute the EAC for both machines.
|
What privacy compromises may have occurred
: What processes for employee termination and privileged user access need to be in place? What privacy compromises may have occurred?
|
How you interpreting statistical output for data analysis
: The purpose of this Assignment is to enable you to present the information that you gather from a systematic review on your PICOT topic.
|
What is irr for project if tax rate is twenty-three percent
: You will be able to reduce working capital by $99,000 (this is a one-time reduction). If the tax rate is 23 percent, what is the IRR for this project?
|
What is the npv of project if discount rate is nine percent
: An initial investment in net working capital of $26,500. If the tax rate is 21 percent and the discount rate is 9 percent, what is the NPV of this project?
|
Describe unconventional attack
: Describe an unconventional attack (e.g., cyber, WMD/CBRN, violent extremist) that has occurred in the United States within the past five years.
|