Write a memo to the ceo of the company

Assignment Help Management Information Sys
Reference no: EM131257177

Before doing this assignment, be sure you are familiar with the General Instructions for Written Assignments found in the Course Information Module.

For this assignment, imagine that you are a cybersecurity consultant hired to identify the biggest threats to a company. You can choose any of the following companies:

Amazon
Microsoft
Cisco
Costco
Comcast
Boeing
Wells-Fargo Bank
Your local electric utility
Your local hospital

If you want to choose a different company, ask and you may be allowed to. Just be sure to ask early.

Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the company.

Remember from Module 1 that a threat has three elements: something bad that can happen to the company, an attacker that could make it happen, and a reason why the attacker would want to do it. Your description of each threat must include all three of those.

And when you describe "something bad that can happen", describe the consequences to the company, don't describe the methods that the attackers used. For instance, don't say something about bad passwords or SQL injection. The CEO doesn't know what SQL injection is, and the CEO doesn't need to know that. The CEO needs to know what kind of damage the attack could cause to the company.

Along with the description of each threat, you must also tell the CEO a little bit about an attack that has happened to some other organization that is similar. The CEO needs to understand it is a real threat, not some imaginary threat that has never happened before.

Finally, don't try to tell the CEO what they should be doing to prevent the threats, just tell them about the threats. If they are happy with your work, you will get a follow-on contract where you can provide suggestions for what they can do to prevent them, but not now.

The format of the memo must follow the instructions in the ADMG385MemoFormatting.pdf document linked below. If you've taken ADMG 385 you've probably seen this. Note that the document is both instructions for how to write a memo, and an example of a memo. And notice how the memo is broken into paragraphs. Some students seem to have great difficulty breaking their writing into paragraphs, but it is much easier to read in smaller paragraphs. Do it!

The memo instructions talk about optional headings. You must use a separate heading for each of the three threats.

If you have letterhead that you can write your memo on, either from another class or from your own business or wherever, great, use it. Professional letterhead always makes a memo look better, and you are a professional cybersecurity consultant. But letterhead is not required for the assignment.

The description of each threat must be at least 150 words.

Reference no: EM131257177

Questions Cloud

Slice into capital spending : The rise of the dollar could batter the profits of some U.S. companies this year and slice into capital spending.
Identify additional information you would need to recommend : Identify any additional information you would need to recommend a solution, and explain where you would likely find that information.
Conditions produce downward movement of price : Assume Qs represents the quantity supplied at a given price and Qd represents the quantity demanded at the same given price.Wich of the following market conditions produce a downward movement of the price?
Discuss theories about the causes of the collapse : "The Collapse of the Soviet Union." Please respond to the following: Roskin and Berry discuss three theories about the causes of the collapse of the Soviet Union: (imperial overstretch, defective system, bungled reform)
Write a memo to the ceo of the company : Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..
Write a memo to the ceo of the company : Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..
Overcome the measurement error bias : uppose the amount of labor, L , employed by the firms is also a linear function of expected sales: Li = α1 + α2Xi^e Explain how the relationship between L and X^e can be used to overcome the measurement error bias, and justify your suggestion.
Develop a company description : For the first part of your course project, you need to develop a company description based on the following criteria: the company name, its history, its products or services (with brief descriptions), the company mission statement, the company cul..
How many cucumbers can she expect to harvest : How many cucumbers can she expect to harvest? Find the probability that Mimi harvests at least 2 of the 10 cucumbers. Construct a table describing the probability distribution.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Determine the average daily utilization of trucks

Assume the district has 10 trucks and use a simulation sample of 10 days to determine the average daily utilization of trucks.

  Create and document the necessary code changes

Create and document the necessary code changes that are requested. Prepare a brief descriptive summary of the networking configuration of the wired visual configuration from the diagram provided, and use this to create and describe a Visio diagram..

  Service operations queues

How are people waiting in queues in service operations similar to buffering inventories in manufacturing and in what ways are they different

  Describe the business uses of cloud computing and web 2.0

Cloud Computing and Web 2.0 - Describe the business uses of cloud computing and Web 2.0

  Logistics criteria for decision making

Would the logistics criteria for decision making be the same as for mass merchandising? Why or why not

  Fundamentals of database systems

Now that the ERD is completed for your selected project, you are anxious to create the database and setup the tables. Before that step you remind everyone that the 2nd phase in the Database development process has not been completed yet

  Brochure advertising your services as a data repository

Create a brochure advertising your services as a data repository. Research commercial data repositories.

  Define at least three items that organization it department

Evaluate the ways that SaaS, PaaS, and IaaS are used to reduce Total Cost of Ownership (TCO) and increase Return on Investment (ROI). Create SaaS, PaaS, and IaaS architectural diagrams using Microsoft Visio or an equivalent such as Dia. Note: The..

  Describe the technology required to use these tools

Write a paper explaining the business uses of cloud computing and Web 2.0. Be sure to address the following in your assignment: Describe the technology required to use these tools

  Identifying and discussing several new it technologies

Select one of these technologies and determine what methods you would use to integrate this technology into a company of your choosing. Explain why you chose this technology and what advantages it presents to the company.

  Identify what major objectives are for the closeout phase

Research system integration implementation closeout processes and challenges. Identify what the major objectives are for the closeout phase and why this is important to successful completion. Discuss 5 major challenges involved with planning the clos..

  Joint application developmenti do agree with you that jad

joint application developmenti do agree with you that jad has its advantages over the traditional design techniques of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd