What type of audit should be used

Assignment Help Other Subject
Reference no: EM133665629

Security Management

A list of selected real-world cyber security incidents is included below*.

Colonial Pipeline, May 2021

Nine Entertainment, March 2021

Marriot International, March 2020

Twitter, July 2020

Electronic Arts (E.A.), June 2021

Choose ONE of the above incidents and write a report analysing the cyber security incident. Your report must include the following information:
A brief overview of the incident
An explanation of who was affected by the incident
The nature and type of cyber attack
The severity of the cyber attack
Threat actors and their motivates (if any)

Any identified Indicators of Compromise (IOCs)
The elements of security that were compromised (i.e. the C.I.A. Triad)

The systems, data or users affected

The vulnerability or vulnerabilities exploited (if known)
Actions taken to control and prevent further damage
Lessons learned

Your report should follow the structure below:

Title/Section page
Introduction
Incident overview
Incident analysis
Lessons learned
Conclusion

References

You should aim for around 2000-2500 words for Part 1A

Based on all the available information from the incident in Part 1A, describe or outline a possible Cyber Kill Chain. You may wish to include any diagrams or illustrations to support your answer.

This should be a maximum of 350 words

Carrying out your own research on the Fastly Content Delivery Network (CDN) internet outage in June 2021.
Briefly explain the incident (maximum 100 words)
Discuss the incident response and disaster strategies that companies affected by this event should implement. (maximum 200 words)
Create a 'Business Continuity' Information Security policy document for the event (maximum 2 pages)

Answer the following questions about Security Management topics

Discuss the benefits of ISO/IEC 27001 certification.

Discuss and explain how an audit or what type of audit should be used for the chosen incident in Part 1A.
Outline a Risk Management process for the incident in Part 2.

The submission will be a ONE PDF file structured in the following sections:
Title Page
Include: the date, assignment name, module name and code, student first and last names and student ID number
Part 1A - Cyber Attacks

Part 1B - Cyber Kill Chain

Part 2 - Disaster Recovery and Business Continuity

Part 3 - Security Management Questions

References
All references must be in the appropriate Harvard referencing style

You must use a sufficient number of suitable scholarly references

Attachment:- Security Management.rar

Reference no: EM133665629

Questions Cloud

Severe facial trauma is fully immobilized on backboard : A conscious but combative patient with severe facial trauma is fully immobilized on a backboard.
Anemia of inflammation : Normocytic anemia is called anemia of chronic disease (ACD) or anemia of inflammation (AI).
It project management tools and techniques : ICT 601 IT Project Management, Victorian Institute of Technology - phases of projects and to successfully manage the projects by using various IT project
Why you consider policy development and advocacy necessary : Why do you consider policy development and advocacy necessary? Why is advocating for health policy development necessary to drive improvements?
What type of audit should be used : UEL-CN-7014 Security Management, University of East London - Discuss and explain how an audit or what type of audit should be used for the chosen incident
Identify a professional practice use of theories presented : Identify a professional practice use of the theories/concepts presented in article. Describe your approach to identifying and analyzing peer-reviewed research.
Surgical team failed to notice surgeon marking error : However, the surgical team failed to notice the surgeon's marking error.
Explain whether goals at your organization are established : Explain whether goals at your organization are established, for these metrics you reviewed, and whether or not they are currently being met.
Describe a practical application for predictive analytics : Describe a practical application for predictive analytics in nursing practice. What challenges do you envision for future of predictive analytics in healthcare?

Reviews

Write a Review

Other Subject Questions & Answers

  Meaning of cultural empathy

Explain what "cultural empathy" means to you? Can we really know the inner experiences of clients? How has this course prepared you to deal with cultural diversity in your chosen area of counselling practice?

  Examine israeli-palestine conflict in international relation

Examine the Israeli-Palestine conflict in international relations from the three major IR perspectives (liberalism, realism and identity)

  Compare and contrast the impact on society

Discuss the factors that influenced the evolution of the one crime and the emergence of the other crime.

  Did you use a particular nohs ethical standard

The school has thus far refused such testing. Should you do this (why/ why not)? Is it ethical? Is it professional - A classmate tells you that she sells flower extracts to clients to help them heal.

  Compare two resources available for a family

Compare two resources available for a family of four that has experienced domestic violence and needs shelter.

  Explain how a christian view of heroism considers problem

In Dante's Divine Comedy, explain how a Christian view of heroism considers and responds to the ancient problem of sin and our need for redemption

  Describe the Alternative Strategic Approach

Describe the Alternative Strategic Approach - Describe the advantages and disadvantages of this strategy. Be sure to support your reasoning

  Reflect on personal and social identities

Reflect on your personal and social identities (be sure to include both visible and invisible aspects of your identity).

  How people social interactions change

A researcher wants to examine how people's social interactions change from 15 to 65.

  How widespread is the problem of domestic violence

1. How widespread is the problem of domestic violence (provide specific data regarding the frequency of domestic violence)

  Short description of the important details of the disaster

A short description of the important details of the disaster containing all the details that are subsequently referred to in your analysis.

  Difference between the nature vs nurture debate

What is the difference between the Nature vs Nurture Debate?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd