You are a newly hired Cybersecurity Manager for a medium sized global organization

User Generated

rbalnexb

Computer Science

Description

You are a newly hired Cybersecurity Manager for a

medium sized global organization (100–150 people)

that manufactures wifi based-systems for automobile

vendors. The organization has one government

contract. You have received the go ahead from upper

management to kick off a data security project. The

goal of the project is to determine the location of all the

critical and confidential data systems, describe the

types of possible threats targeting the critical and

confidential data, determine why the threats exist, why

the enterprise systems may be vulnerable to cyberattack,

and where vulnerabilities may lie.

Unformatted Attachment Preview

Sample Content Topic 10/24/18, 10)24 PM Assignment Details Scenario You are a newly hired Cybersecurity Manager for a medium sized global organization (100–150 people) that manufactures wifi based-systems for automobile vendors. The organization has one government contract. You have received the go ahead from upper management to kick off a data security project. The goal of the project is to determine the location of all the critical and confidential data systems, describe the types of possible threats targeting the critical and confidential data, determine why the threats exist, why the enterprise systems may be vulnerable to cyberattack, and where vulnerabilities may lie. You are going to write a paper describing the overarching goal of the project that includes at least three examples so that the project manager can get a clear understanding of the goals. To provide inspiration for this Assignment, it is suggested that you read the “I BM Proactive Strategy for Data Security”. Instructions: By conducting research, select three types of enterprise systems, one of which operates in the cloud. All systems store some confidential data in their data store. One system must store confidential data in a relational database system like Microsoft® SQL Server®. The cloud-based system must use a NoSQL https://purdueglobal.brightspace.com/content/enforced/72904-042-…2lSessionVal=55ckMk7c5yuEhHfmfeSVggVwH&ou=72904&d2l_body_type=3 Page 1 of 4 Sample Content Topic 10/24/18, 10)24 PM database technology, and the final system, which resides in the Switzerland sales office, must use a proprietary database system. All systems are accessible using a browser, and each enterprise system has a mobile application that can be used to access data from the enterprise system. Describe threats that specifically target confidentiality on the data driven systems and their associated infrastructure that you selected. Determine why the threats you describe exist and determine at least two data/database vulnerabilities. Finally, determine one known malicious software that could confiscate confidential information from one of the enterprise systems. Your paper should be 5–6 pages of content (exclusive of cover sheet etc.), using Times New Roman font style, 12pt, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s). Be sure to document your content with proper APA in text citations that match your reference list. You must support your research and assertions with at least three credible sources. You may use peerreviewed articles, trade magazine articles or IT research company (Gartner, Forrester, etc.) reports to support your research; you can use the Library to search for supporting and peer-reviewed articles. Wikipedia and similar sources are unacceptable. In accordance with the University Academic Integrity policy, your assignment will be automatically submitted to TurnItIn (see: http://turnitin.com/en_us/features/origi https://purdueglobal.brightspace.com/content/enforced/72904-042…2lSessionVal=55ckMk7c5yuEhHfmfeSVggVwH&ou=72904&d2l_body_type=3 Page 2 of 4 Sample Content Topic 10/24/18, 10)24 PM nalitycheck ). The policy states that papers submitted for credit in any course should contain less than 25% “non-original” material, so avoid large sections of direct quotes. Be sure that you use APA formatting to properly cite and reference all non-original material. No more than one figure and/or one table should be included, and any figures or tables used must clearly support a specific point of the critical analysis. Any figure or table must use an APA formatted figure or table caption. Assignment Requirements: 5–6 pages of content (exclusive of cover sheet etc.), using Times New Roman font style, 12pt, doublespaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s). At least three credible sources No more than one figure and/or table in the content No spelling errors. No grammar errors. No APA errors. For more information and example of APA formatting, visit the Writing Center from the Homepage. Also review the Policy on Plagiarism. If you have any questions, please contact your professor. Rubric Review the assignment instructions and grading rubric. https://kapextmediassl-a.akamaihd.net/IST/IT544_150 6D/docs/IT544_U2_Assignment.pdf https://purdueglobal.brightspace.com/content/enforced/72904-042…2lSessionVal=55ckMk7c5yuEhHfmfeSVggVwH&ou=72904&d2l_body_type=3 Page 3 of 4 Sample Content Topic 10/24/18, 10)24 PM Submit completed assignment to Dropbox https://purdueglobal.brightspace.com/content/enforced/72904-042…2lSessionVal=55ckMk7c5yuEhHfmfeSVggVwH&ou=72904&d2l_body_type=3 Page 4 of 4
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Find attached work, thank y...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags