Description

Description

Analyzing cubersecurity case in term of the cause, security failures, impact, and what could have been done differently to prevent or mitigate the attack.Then make presentation about the case study to present it to audiance.
Please follow the description and instrucation that available in the attached file and put the answer after each question.

College of Computing and Informatics

Project
Deadline: Day 01/12/2024 @ 23:59
[Total Mark is 14]
Student Details:

CRN:

Name:
Name:
Name:

ID:
ID:
ID:

Instructions:

• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.

• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).

• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.

• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.

• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.

Restricted – ‫مقيد‬

Description and Instructions

Pg. 01

Description and Instructions
Project Description:
This project is an opportunity for you to practice your knowledge and skills. Here are
several cybersecurity cases each case highlights a different aspect of cybersecurity.
You should choose one case as a group and analyze the case in terms of the cause,
security failures, impact, and what could have been done differently to prevent or
mitigate the attack.
After that, each group should Make a presentation. Presentations begin in the ninth
week.
Total Marks = 14
Presentation

Project File

5 marks

5 marks

Answer your colleagues’
questions.
4 marks

Group Size = maximum 3 members.

The chosen case should be divided between members of the group.

Each member must present his part.

Marks will be awarded based on your explanation, the quality of the content, your
discussion skills, and the correctness of your answers.

The students must answer the questions in this activity individually to get discussion
marks

One group member (group leader) should submit Project File and Presentation
Slides on Blackboard.

Presentation Marking Criteria:

Restricted – ‫مقيد‬

Pg. 02

Description and Instructions

Complete content (Introduction, body, and conclusion)

3 marks

Effective use of time (max. 8-10 minutes)

1 mark

Voice projection and loudness/ Eye contact/ Confidence and 1 mark
attitude

Restricted – ‫مقيد‬

Description and Instructions

Pg. 03

Capital One Data Breach (2019)

Learning
Outcome(s):
CLO1: Explain
networking and
security, security
issues, trends,
and security

Case Summary:
In 2019, a former Amazon Web Services (AWS) employee exploited a misconfigured
firewall in Capital One’s cloud infrastructure, leading to a data breach that exposed
sensitive information of over 100 million customers. The breach involved personal data
such as names, addresses, credit scores, and bank account information.
Key Questions for Analysis:

CLO2: Apply
effective, proper,

1. How did a misconfigured cloud infrastructure contribute to this breach, and

and state-of-the-

what could Capital One have done to secure its cloud environment?

art security tools

2. What role does cloud security and shared responsibility between cloud

and technologies.

providers and customers play in preventing breaches?
3. Analyze the importance of securing sensitive data in cloud environments with

CLO6:
Demonstrate
processes to
implement and
enforce policy

proper encryption and access controls.
4. How should organizations secure hybrid cloud environments, especially when
handling sensitive financial information?
5. Critique Capital One’s incident response and the role of cloud security audits in
preventing future breaches.

Restricted – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Description

Description A report, referring to the above scenario, with written responses to each of the 10instructions above. • Approximately 3900 words in total, refer to CIPD word count policy. Please tick whether you are submitting a draft or your summative assessment: Draft ☐ ☐ Summative Complete the first part of

Description

Description Research Structure: 1. Introduction – Background of the mining industry in general and in KSA. – Importance of digitization and automation. – Objectives of my study. 2. Theoretical Framework – Concepts and theories related to digitization, automation, and the future of work. 3. Literature Review – Summary of existing

Description

Description See College of Health Sciences Department of Health Informatics ASSIGNMENT COVER SHEET Course name: Public health outbreak and disaster management Course number: PHC 372 Assignment title The Role of Technology in Public Health Disaster Management “Natural disasters have always been a significant threat to human lives and infrastructure, causing

Description

Description See College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name Maternal and Child Health Course number PHC 373 CRN – Branch name XXXXX Assignment title or task: ( write and questions) Discuss the methods, advantages, and criticisms of evidence-based practice in maternal and child health

Description

Description See College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name Maternal and Child Health Course number PHC 373 CRN – Branch name XXXXX Assignment title or task: ( write and questions) Discuss the methods, advantages, and criticisms of evidence-based practice in maternal and child health

Description

Description see College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name Maternal and Child Health Course number PHC 373 CRN – Branch name XXXXX Assignment title or task: ( write and questions) Discuss the methods, advantages, and criticisms of evidence-based practice in maternal and child health

Description

Description RISK MANAGEMENT IN MULTI-SECTOR PARTNERSHIPS IN SAUDI ARABIA: A GOVERNANCE PERSPECTIVE Thesis Submitted in Partial Fulfillment of the Requirements for the Award of the Degree of MASTER OF BUSINESS ADMINISTRATION BY DINA MANSOUR ALSHEHRI Under Supervision Dr. Asra Inkesar COLLEGE OF ADMINISTRATIVE AND FINANCIAL SCIENCES SAUDI ELECTRONIC UNIVERSITY 2024-2025

Description

Description Comparison In terms of only 1/ The educational objective 2/ The teaching style 3/ The methodology and tools used no Plagiarism 5-6 pages no Plagiarism No AI INTERNATIONAL JOURNAL OF SPECIAL EDUCATION Vol.33, No.2, 2018 Twice-Exceptionality in the Kingdom of Saudi Arabia: Policy Recommendations for Advances in Special Education

Description

Description Hello, you can continue the research while I get the remaining of data from survey so we can get use of time.

Description

Description I do it but I am not sure. Please make short answer The Impact of Remote Work on Employee Productivity: A Study on Government Sector Employees in Saudi Arabia in the Post-Pandemic Era Thesis Submitted in Partial Fulfillment of the Requirements for the Award of the Degree of MASTER

Description

Description please kindly no AI or Chat gbt. Write about 200-250 for each subject. I have 4 subjects which are: 1- Write a descriptive essay about the best holiday you greatly enjoyed in the past. 2- In your opinion what is the most important element of happiness ? 3- In

Description

Description see College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name: Advanced Epidemiology Course number: PHC 332 CRN: XXXX Assignment title or task: (You can write a question) Using Causal Criteria show that smoking causes lung cancer. Student Name: XXX Student ID: XXX Submission Date: XXX

Description

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 1 Business Ethics and Organization Social Responsibility (MGT 422) Due Date: 01/03//2025 @ 23:59 Course Name: Business Ethics and Organization Social Responsibility Course Code:

Description

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Business Ethics and Organization Social Responsibility (MGT 422) Due Date: 22/03//2025 @ 23:59 Course Name: Business Ethics and Organization Social Responsibility Course Code:

Description

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Business Ethics and Organization Social Responsibility (MGT 422) Due Date: 26/04/2025 @ 23:59 Course Name: Business Ethics and Organization Social Responsibility Course Code:

Description

Description Revise the word file according to the instructor’s comments, and after making the necessary changes, organize it based on the requirements outlined in the attached PDF. 1 Digital Currencies Student’s Name University Course Title Professor’s Name Date 2 Digital Currencies 1. Research Approach The research design of this study

Description

Description The Impact of AI-Driven Workflow Optimization on Employee Satisfaction in Radiology: The Mediating Role of Job Stress Reduction Thesis Submitted in Partial Fulfillment of the Requirements for the Award of the Degree of MASTER OF BUSINESS ADMINISTRATION BY Liyan Abdumohsen Almayouf Under Supervision Dr .Asra inkesar COLLEGE OF ADMINISTRATIVE

Description

Description the document with the required information on PRISMA and JBI. Both should come in the results section. In Methodology, you should mention them, but give the table/figure in the results section. Also, the total number of references is still less. You can try to cite more relevant articles in