Write a memo to the ceo of the company

Assignment Help Management Information Sys
Reference no: EM131257177

Before doing this assignment, be sure you are familiar with the General Instructions for Written Assignments found in the Course Information Module.

For this assignment, imagine that you are a cybersecurity consultant hired to identify the biggest threats to a company. You can choose any of the following companies:

Amazon
Microsoft
Cisco
Costco
Comcast
Boeing
Wells-Fargo Bank
Your local electric utility
Your local hospital

If you want to choose a different company, ask and you may be allowed to. Just be sure to ask early.

Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the company.

Remember from Module 1 that a threat has three elements: something bad that can happen to the company, an attacker that could make it happen, and a reason why the attacker would want to do it. Your description of each threat must include all three of those.

And when you describe "something bad that can happen", describe the consequences to the company, don't describe the methods that the attackers used. For instance, don't say something about bad passwords or SQL injection. The CEO doesn't know what SQL injection is, and the CEO doesn't need to know that. The CEO needs to know what kind of damage the attack could cause to the company.

Along with the description of each threat, you must also tell the CEO a little bit about an attack that has happened to some other organization that is similar. The CEO needs to understand it is a real threat, not some imaginary threat that has never happened before.

Finally, don't try to tell the CEO what they should be doing to prevent the threats, just tell them about the threats. If they are happy with your work, you will get a follow-on contract where you can provide suggestions for what they can do to prevent them, but not now.

The format of the memo must follow the instructions in the ADMG385MemoFormatting.pdf document linked below. If you've taken ADMG 385 you've probably seen this. Note that the document is both instructions for how to write a memo, and an example of a memo. And notice how the memo is broken into paragraphs. Some students seem to have great difficulty breaking their writing into paragraphs, but it is much easier to read in smaller paragraphs. Do it!

The memo instructions talk about optional headings. You must use a separate heading for each of the three threats.

If you have letterhead that you can write your memo on, either from another class or from your own business or wherever, great, use it. Professional letterhead always makes a memo look better, and you are a professional cybersecurity consultant. But letterhead is not required for the assignment.

The description of each threat must be at least 150 words.

Reference no: EM131257177

Questions Cloud

Slice into capital spending : The rise of the dollar could batter the profits of some U.S. companies this year and slice into capital spending.
Identify additional information you would need to recommend : Identify any additional information you would need to recommend a solution, and explain where you would likely find that information.
Conditions produce downward movement of price : Assume Qs represents the quantity supplied at a given price and Qd represents the quantity demanded at the same given price.Wich of the following market conditions produce a downward movement of the price?
Discuss theories about the causes of the collapse : "The Collapse of the Soviet Union." Please respond to the following: Roskin and Berry discuss three theories about the causes of the collapse of the Soviet Union: (imperial overstretch, defective system, bungled reform)
Write a memo to the ceo of the company : Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..
Write a memo to the ceo of the company : Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..
Overcome the measurement error bias : uppose the amount of labor, L , employed by the firms is also a linear function of expected sales: Li = α1 + α2Xi^e Explain how the relationship between L and X^e can be used to overcome the measurement error bias, and justify your suggestion.
Develop a company description : For the first part of your course project, you need to develop a company description based on the following criteria: the company name, its history, its products or services (with brief descriptions), the company mission statement, the company cul..
How many cucumbers can she expect to harvest : How many cucumbers can she expect to harvest? Find the probability that Mimi harvests at least 2 of the 10 cucumbers. Construct a table describing the probability distribution.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd