What type of audit should be used

Assignment Help Other Subject
Reference no: EM133665629

Security Management

A list of selected real-world cyber security incidents is included below*.

Colonial Pipeline, May 2021

Nine Entertainment, March 2021

Marriot International, March 2020

Twitter, July 2020

Electronic Arts (E.A.), June 2021

Choose ONE of the above incidents and write a report analysing the cyber security incident. Your report must include the following information:
A brief overview of the incident
An explanation of who was affected by the incident
The nature and type of cyber attack
The severity of the cyber attack
Threat actors and their motivates (if any)

Any identified Indicators of Compromise (IOCs)
The elements of security that were compromised (i.e. the C.I.A. Triad)

The systems, data or users affected

The vulnerability or vulnerabilities exploited (if known)
Actions taken to control and prevent further damage
Lessons learned

Your report should follow the structure below:

Title/Section page
Introduction
Incident overview
Incident analysis
Lessons learned
Conclusion

References

You should aim for around 2000-2500 words for Part 1A

Based on all the available information from the incident in Part 1A, describe or outline a possible Cyber Kill Chain. You may wish to include any diagrams or illustrations to support your answer.

This should be a maximum of 350 words

Carrying out your own research on the Fastly Content Delivery Network (CDN) internet outage in June 2021.
Briefly explain the incident (maximum 100 words)
Discuss the incident response and disaster strategies that companies affected by this event should implement. (maximum 200 words)
Create a 'Business Continuity' Information Security policy document for the event (maximum 2 pages)

Answer the following questions about Security Management topics

Discuss the benefits of ISO/IEC 27001 certification.

Discuss and explain how an audit or what type of audit should be used for the chosen incident in Part 1A.
Outline a Risk Management process for the incident in Part 2.

The submission will be a ONE PDF file structured in the following sections:
Title Page
Include: the date, assignment name, module name and code, student first and last names and student ID number
Part 1A - Cyber Attacks

Part 1B - Cyber Kill Chain

Part 2 - Disaster Recovery and Business Continuity

Part 3 - Security Management Questions

References
All references must be in the appropriate Harvard referencing style

You must use a sufficient number of suitable scholarly references

Attachment:- Security Management.rar

Reference no: EM133665629

Questions Cloud

Severe facial trauma is fully immobilized on backboard : A conscious but combative patient with severe facial trauma is fully immobilized on a backboard.
Anemia of inflammation : Normocytic anemia is called anemia of chronic disease (ACD) or anemia of inflammation (AI).
It project management tools and techniques : ICT 601 IT Project Management, Victorian Institute of Technology - phases of projects and to successfully manage the projects by using various IT project
Why you consider policy development and advocacy necessary : Why do you consider policy development and advocacy necessary? Why is advocating for health policy development necessary to drive improvements?
What type of audit should be used : UEL-CN-7014 Security Management, University of East London - Discuss and explain how an audit or what type of audit should be used for the chosen incident
Identify a professional practice use of theories presented : Identify a professional practice use of the theories/concepts presented in article. Describe your approach to identifying and analyzing peer-reviewed research.
Surgical team failed to notice surgeon marking error : However, the surgical team failed to notice the surgeon's marking error.
Explain whether goals at your organization are established : Explain whether goals at your organization are established, for these metrics you reviewed, and whether or not they are currently being met.
Describe a practical application for predictive analytics : Describe a practical application for predictive analytics in nursing practice. What challenges do you envision for future of predictive analytics in healthcare?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd