What the attacker did stole and wanted

Assignment Help Computer Engineering
Reference no: EM133663804

Assignment: IS Security and Risk Management

Overview

Write a report to discuss recent types of information security attacks, protection mechanisms and risk management.

Approach Analysis

You are required to choose one of the data breaches from the list above in Table 1 and create a report on it. Your report must include the following information.

A. Detail of the Attack:

This section of your report should include the elements below.

1. What was the attack? What vulnerability was exploited?
2. Was the vulnerability already known? When did it happen?
3. Were there any controls implemented against the vulnerability and yet it was exploited?

B. Analysis and Action:

This section of your report should include the elements below.

1. When and how did the target figure out about the attack?
2. For how long, the risk was not actioned?
3. Did the organisation have a risk assessment policy and procedure?
4. Did the organisation maintain a risk register?
5. Was the vulnerability included in the risk register?
6. How was the risk perceived (critical/non-critical/high/medium/low)?
7. What the attacker(s) did, stole, and wanted?
8. Did the organisation pay anything because of the attack?
9. What action did they adopt to avoid further damage?

C. Risk assessment

1. Risk Identification
2. Risk Analysis
3. Risk Evaluation

Risk Identification and Assessment

In this section, you need to identify risks and conduct an analysis of the selected use case. Regarding the selected scenario, reasonable assumptions can be made if they are adequately documented and supported. To perform risk identification and analysis, you can choose either of the following tools or a combination of them.

1. Factors Analysis in Information Risk (FAIR)
2. NIST Privacy Risk Assessment Methodology (PRAM)
3. NIST CyberSecurity Framework (CSF)

Description

Assume you have been recruited as a cybersecurity specialist by the client organization (the use case you chose). You are responsible for conducting a security risk assessment and preparing this report for the board members. In most organizations, board members have minimal levels of computer literacy and risk-related knowledge. Include the following information in your report preparation:

A. Introduction

B. Details of the attack

C. Analysis and action

D. Risk Assessment

1. Risk Identification
2. Risk Analysis
3. Risk Evaluation

E. Conclusion

F. References

Reference no: EM133663804

Questions Cloud

Comprehensive review of the reference materials : Comprehensive review of the reference materials you have utilised - Individual Cover Page with the students Identification (Name and Student Number)
Create a data frame and load the excel or csv file : Create a data frame and load the Excel or CSV file. Create a temp dataset with your main dataset. Perform arithmetic with one of your numeric fields.
Identify potential sources of information that can be used : CT 421- Identify potential sources of information that can be used to develop and support ideas. Identify the problem to be solved.
What is the main function of the mitochondria : What is the main function of the mitochondria within the cells - what would be your hypothesis on how this can happen knowing the function of the mitochondria
What the attacker did stole and wanted : BIS 3004- What the attacker(s) did, stole and wanted? Did organisation pay anything because of the attack? What action did they adopt to avoid further damage?
Job description for entry-level store employee : Use the table below to draft a job description for an Entry-level Store Employee.
Explain the planning process : Explain the planning process that outlines the key elements and strategies for the company to reach the risk management.
Develop a business plan for online media solutions : Develop a business plan for Online Media Solutions. To prepare to develop the business plan, you need to arrange a meeting with the Senior Management team
If lighting is recessed in return air plenum ceiling : If lighting is recessed in a return air plenum ceiling, what will the effect be on supply air needed to cooling the occupied space?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a java boolean method which takes a 2-d array

Write a Java boolean method, equalRowCol, which takes a 2-dimensional array of int as a parameter and returns true if there is an entry.

  Describe a process of making it more widely

Conflict-management techniques allow managers to control conflict levels (not only decrease but also increase them). choose a problem that disturbs you and is not solved.

  Discuss your findings with the director about the project

You discuss your findings with the director and find out that this project has been going on for 2 years and has cost this nonprofit close to $250,000 a year

  What are the primary factors that contribute to poor-quality

What are the primary factors that contribute to poor-quality software? Which of these factors can be traced back to poor ethical decisions on the part

  Describe the several emerging concepts

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that.

  Sketch a totem pole output stage and explain its operation

Sketch a totem-pole output stage and explain its operation and the advantages of incorporating this circuit in the TTL circuit.

  Explain the porter five forces model

In the AllDrinksSoft, what are the challenges that the company faces with its analytics rollout? How would you address and prioritize these challenges?

  How knowledge or skills of cloud computing have been applied

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Cloud Computing have been applied.

  Explain how a neural net can be trained

Explain how a neural net can be trained. What are the three basic types of processing that occur during human/computer voice interaction?

  Discuss how specialized learning and the attainment of an

write a 1-page paper in which you discuss the following topics1.reflect on and write two to three of your personal and

  Define how storage systems used in information systems

You will begin with your own Internet and/or Walden Library search for 1 or 2 current and credible articles on the various types of data resources, processes.

  Explain benefits of performing pandemic risk assessment

Work Area Recovery Plan is a vital plan that establishes an adequate environment for people to work in the event of a disruptive incident.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd