Follow the attached instructions to complete this work. Leadership Update: Cyber Crime   You will start by writing a short paper as described in

Follow the attached instructions to complete this work.

Leadership Update: Cyber Crime

 

You will start by writing a short paper as described in the discussion question. You will be using information from this week’s readings and from your own research to address the information needs expressed in the question.

Create an MS Word document containing your “short paper” (response) for the discussion topic. Use MS Word to spell check and grammar check your work.

The senior leadership of your organization is preparing for its annual three-day meeting. During these meetings, one day is devoted to current events / issues which the company finds itself needing to address. For this year’s meeting, you have been asked to give a presentation on Cybercrime as a strategic threat to the organization.

Over and over in your career you are going to have to take threat intelligence including news stories on breaches and attacks and then evaluate your network for exposure and figure out if you are vulnerable and how to mitigate the risk. 

To prepare for your presentation, you should find a recent news report or law enforcement press release about a specific instance of a cybercrime which impacted the financial services industry (or customers). Analyze the report / press release and then write a background paper containing your analysis and findings.

In your background paper, include a summary of the report or press release that addresses the crime, the perpetrator, motive (if known), methods, the victim(s), the object of the crime (systems, data, networks, etc.), and the outcome of the investigation / prosecution.  (Who did what to whom? What happened?)

Should the company take actions or develop strategies to protect itself from similar crimes? What are your recommendations in this regard?

Post your 5 to 7 paragraph background paper as a reply to this topic. Remember to cite your sources and include a reference list at the end of your posting.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

SQL Statements Exercise 8: Write your SQL statement in a file named CIS276DA_Lesson3Exercise8_MEID.sql. Run the script and export the results to

SQL Statements Exercise 8: Write your SQL statement in a file named CIS276DA_Lesson3Exercise8_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise8_MEID.csv. Exercise 9: Write your SQL statement in a file named CIS276DA_Lesson3Exercise9_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise9_MEID.csv. Exercise 10: Write your SQL statement in a

An interrupt occurs. Data transfer for the current application completes. Execute kernel function in kernel mode. Transfer execution to

An interrupt occurs. Data transfer for the current application completes. Execute kernel function in kernel mode. Transfer execution to another application. An interrupt occurs. Block the current application. Data transfer for the current application completes. Transfer execution from another application back to the kernel in kernel mode. this are the option give me the

Project 1: Develop Cloud Migration Plan  Step 4: Install AWS Application Discovery Agent  At this point in the migration planning process, you’ve

Project 1: Develop Cloud Migration Plan  Step 4: Install AWS Application Discovery Agent  At this point in the migration planning process, you’ve considered premigration issues, reviewed premigration assessment tools, and familiarized yourself with AWS Application Discovery Services. You are now ready to install and test the AWS Application Discovery Agent.

Discussion: Evaluation of AWS Application Discovery Service

Discussion: Evaluation of AWS Application Discovery Service Contains unread posts Now that you have discussed the data migration and application migration strategies, you will discuss and evaluate AWS Application Discovery Service. You should ensure that you cover the following areas: · What is agent-based discovery? · What is agentless discovery?