In this week’s brief to the board, you will discuss “The recent Cyber Attack on Acme Inc” (based on a situation from another company that recently exprienced a cyber attack), to the Board of Directors.
My goal is to help you create actionable reports on the writing topics throughout this course. This will help prepare you for creating engaging and meaningful reports in the workplace to aid your career.
I would recommend that you start with the bottom line upfront, which means that the core content of your analysis should be included in the introduction of your document. This approach is especially helpful for executives, who might have limited time to read a document, and they look for the introduction for the quick analysis which would be a gauge for their likelihood of reading the rest of the document.
Now that you have the reader engaged in your content, you will validate the points which you are making with supporting evidence in the body of your report. This supporting evidence could be something cited from a textbook, website, or explanation of your point of view. When citing sources, please take into account the requirement to credit outside sources for their resources in your work. (See below for notes on plagiarism).
As you wrap your report, you will reiterate your core concepts in the summary and any ideas you wish the reader will take away from reading it. You will also include a references section which will contain all the outside sources which were cited in your report.
All written assignments will follow this process. If the assignment includes multiple questions, your goal will be to answer all the questions in this format. If the assignments include requirements for screenshots, logs, or additional materials, they should be included in the body of the message.
Please do not respond in bulleted or Question&Answer format. My goal is to understand that you comprehend the material and you can effectively communicate it and support ideas/materials in your response.
If you simply answer the question with no additional material, you will not receive full credit for your assignments. From a business point of view, a manager or executive would want a way to validate the responses you provided and the sources that you used, especially it will be used for a critical business decision.
A11: Information Security Audit Program
Details:
Explain what a cyberattack is, and thoroughly describe at least two recent examples of a cyberattack that has taken place against an organization in the United States within the last three years.
For each attack:
1. Briefly describe the nature and operations of the organization that suffered the attack, as well as provide a brief summary description of the attack itself.
2. Put together a list of information security audit controls and procedures that, had they been in place, would have helped mitigate or reduce the impact of the attack.
3. Explain how each information security audit control you listed would have helped mitigate or reduce the attack.
You are required to search beyond the chapter (i.e., IT literature and/or any other valid external source) to back up your response. Include examples, as appropriate, to evidence to support your case. Submit a word file with a cover page, responses to the task above, and a reference section at the end.
Written assignments help evaluate your cognitive learning, which is a style of learning that encourages students to use their minds more effectively. This way of learning encourages students to fully engage in the learning process so learning, thinking, and remembering get easier and easier.
The essay must be in the form of an actionable report to the board of directors.
Last Completed Projects
| topic title | academic level | Writer | delivered |
|---|
