Cybersecurity Breach Case Studies

Cybersecurity Breach Case Studies

Critical Thinking (Traffic Analysis Tools, 3 pages) & (WikiLeaks Case Study, 2 Pages) & (Cybersecurity Breach Case Studies, 6 Pages) APA style

— Task 1 —

(1) – Traffic Analysis Tools

In this assignment, you assume the role of an employee of the DigiFirm Investigation Company. DigiFirm experienced strong profits last quarter and is interested in adding network traffic analysis tools to its lab. You have been asked to research sniffers and other network analysis tools.

There are several sniffers and other tools available for traffic analysis, including:

  • Tcpdump and WinDump
  • Wireshark
  • HTTPSniffer
  • Nmap
  • Snort
  • Retina
  • CoreImpact

You must research these products, and then write a proposal in which you describe the tools’ capabilities and recommend two products to be added to DigiFirm’s lab, and you must justify your recommendations.

Deliverable:

For this assignment, you are to:

  • Research these sniffers and other tools available for traffic analysis, compare the capabilities and, write a professional proposal in which you recommend two products for use in the DigiFirm Lab, and justify your recommendation.
  • Your proposal should be at 3 pages in length.Be sure your report adheres to the Saudi Electronic University academic writing standards and APA style guidelines, citing references as appropriate.
  • It is strongly encouraged that you submit all assignments to the TurnItIn Originality Check prior to submitting it to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the TurnItIn Originality Check – Student Guide.

— Task 2 —

(2) – WikiLeaks Case Study

Read the following WikiLeaks case study (linked below and also available through ProQuest in the library).

Ryst, S. (2011). WikiLeaks fuels data breach fearsBusiness Insurance, 45(1), 1-20.

The disclosures at WikiLeaks have raised significant concerns about the damage caused by leaks. Some claim that in many ways, the Wiki Leaks founder, Julian Assange, was terrorizing nation states and corporations.

What corporate and/or national policy initiative do you think should be put in place in Saudi Arabia to curb such forms of cyberterrorism?

Directions:

  • Your paper should be 2 pages in length, not including the title or reference pages.
  • Be sure to provide citations from your readings and additional research to support your statements.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.
  • You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

— Task 3 —

(3) – Cybersecurity Breach Case Studies

Throughout this course you have learned about incidences of security breaches and potential mitigation strategies. For your final Critical Thinking assignment:

  • Submit a list of three cybersecurity breach case studies. If possible, include at least one breach that occurred in, or impacted, the Middle East.

For each breach, write a brief statement covering the following points:

  1. When did the incident take place (dates)?
  2. What went wrong?
  3. What was the outcome?
  4. How could the breach have been prevented?
  5. What organizational measures should be instituted?
  • In addition to the case studies, write a short summary (2 pages) of key learning points in management of cybersecurity within enterprises.

Directions:

  • Your well-written paper should be 6 pages in length, not including the title or reference pages.
  • Cite and integrate at least three credible sources, not including the textbook, to support your paper.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.
  • You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide

2 days ago

REQUIREMENTS

 security  Information security  Information  computer science  cybersecurity  CS description 11 pages, Double Spacing

Answer preview…………

Introduction

Cybersecurity breaches have become rampant in the modern world, with the malicious users targeting huge corporations and government websites in a bid to execute their ill intentions. Ideal examples of such breaches that have been witnessed in the Middle East include the cyber-attack on Saudi Aramco, the security breach on the Qatar National Bank, and the attack on the Bangladesh National Bank (IQPC, 2015)………

APA 2661 words

Share this paper
Open Whatsapp chat
1
Hello;
Can we help you?