Colorado ITS460 Cyber-Attackt Risk Management Case Study

Question

Dot Image

ITS 460 Colorado State University Cyber-Attackt Risk Management Case Study

OPTION #1: CASE STUDY ANALYSIS

Networks and personal computers are under continuous assault from hackers. The types of attacks vary widely in complexity and severity, but according to the text, hackers generally have one of three motives for compromising network:

  • Financial fraud,
  • Political reasons, or
  • Personal reasons.

Search the Internet or the CSU Global Library (Links to an external site.) to find an example of a hacking activity or situation that represent a cyber-crime, but is different from any examples you used in other assignments for this course.

Write a critical essay that meets the following requirements:

  • Cite and briefly describe your example.
  • Apply what you have learned from the course to this point to identify arguments both in support of and are critical of the behavior of the attackers.
  • Discuss which of the three motives best describes the hacker’s intentions and why that motive is the correct one.
  • Discuss how an information security policy or planning could have impacted the outcome of this event.

Your paper should be 3pages in length and conform to APA guidelines in the CSU Global Writing Center (Links to an external site.). Include at least two scholarly references in addition to the course textbook. The CSU Global Library is a good place to find these references.===============================================================================================================================================

WK 4 OPTION #2: FORMALIZED RISK MANAGEMENT PROGRAM

Your CIO is interested in implementing a formalized risk management program and requests that you submit a report describing the following risk management approaches:

  • Microsoft Risk Management Approach,
  • FAIR, and
  • ISO 27005 Standard for InfoSec Risk Management.

In the report you must include some factors that your organization should consider when selecting a risk management model.

Your paper should be 3-pages in length and conform to APA guidelines in the CSU Global Writing Center (Links to an external site.). Discuss and cite the course text and other materials and at least one additional credible or scholarly source to support your analysis and positions. The CSU Global Library is a good place to find these references.

Having Trouble Meeting Your Deadline?

Get your assignment on Colorado ITS460 Cyber-Attackt Risk Management Case Study completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts