Ethics in a Changing World GB 590
September 4, 2019
HSA 520 FINAL EXAM PART 1
September 4, 2019

By Appointment

Course Number and Name

ISOL 533—Information Security and Risk Management

Course Instructor

Dr. John Morga, Adjunct Professor

Email: john.morga@ucumberlands.edu Office Hours: By Appointment

Cell: 516-743-8472

Instructions for the Breach Report Paper

For ISOL533, the Breach Report Paper is a research exercise that seeks to raise awareness on the importance of securing and protecting vital information that is used in industry, in retail settings, in finance, and in personal transactions every day. The details below describe the requirements of the project.

What is being researched?

The Breach Report Research Project is a study of Information Security data breaches that have been published in the media. You are to find ONE NEWS ARTICLE on the Internet that was a strong example of an Information Security incident or crime.

· The articles must be within the past 6 years (a large system failure, a data breach, a hacking event). Please see “My Favorites” below for some examples, and feel free to use the examples for your own paper.

· The event must be something that was publicly reported on in news media articles. Do NOT pick academic articles gathered from scholarly journals. Do NOT pick passages from textbooks and other hardcopy media. Do NOT take information from Wikipedia. Your grade will be lowered if I cannot access the original articles over the Internet.

· Pick an event that is well-documented. Do NOT pick obscure articles such as a data breach in Buford, Wyoming, the smallest town in America (population: 1). Please stick to major events. Again, use My Favorites below as starting points if you are having trouble choosing a cyber breach or hacking event.

Scope & Format of the Project

The scope and format your paper should be:

· 600-900 words. Microsoft Word. Double-spaced, Arial or Calibri font, APA format. Do NOT write a giant paper that will take me forever to grade please. Do NOT send me a virus-infected file.

· Introduce the article. What happened and who was involved?

· Make sure you thoroughly summarize what happened – what was stolen or compromised. What were the damages or losses? If the event was a solved crime, who were the criminal(s)?

· MOST IMPORTANTLY: How could the event have been avoided? If the issue was corrected, describe what was changed. If not, give your advice based on what you’ve learned in class on how you would avoid the same situation next time. What have the experts suggested?

· Your paper needs a minimum of two references in the bibliography

· You can submit your paper in the classroom in the Breach Report assignment (in the CONTENT folder) or you can email it to me.

PLAGIARISM STATEMENT

ALL OF YOUR WRITING MUST BE IN YOUR OWN WORDS. IF YOU COPY AND PASTE TEXT DIRECTLY FROM YOUR RESEARCH ARTICLES, YOU ARE GUARANTEED TO RECEIVE A ZERO GRADE.

Please heed this warning seriously. There will not be any make-ups or second tries. I will pass your writing through Safe Assign. Please make sure your writing is original.

REWORDING STATEMENT

Please read the first page of my syllabus on rewording. If you reword your paper, you will receive a zero. There will be no make-ups or re-submissions. Besides the academic dishonesty, there is not enough time in an 8-week course to re-grade second-try papers.

My Favorites

If you’re having trouble finding a good article, you may want to consider some of my top favorite security bungles and crimes listed below. Feel free to pick any one of them or your own. These are all national- or world-wide scale events:

The Sony Pictures Hack – 2014:

· https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack/#thebeginning

· https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/?utm_term=.f34b2a0688d7

Target Stores Data Breach – 2013:

· http://www.zdnet.com/article/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned/

· https://www.nbcnews.com/business/business-news/target-settles-2013-hacked-customer-data-breach-18-5-million-n764031

· https://www.usatoday.com/story/money/2017/05/23/target-pay-185m-2013-data-breach-affected-consumers/102063932/

Wannacry Ransomware Attack – 2017

· https://www.npr.org/sections/thetwo-way/2017/05/15/528451534/wannacry-ransomware-what-we-know-monday,causing%20major%20disruptions%20worldwide

· https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/

· https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html

· https://www.npr.org/sections/thetwo-way/2017/12/19/571854614/u-s-says-north-korea-directly-responsible-for-wannacry-ransomware-attack

Yahoo Account Data Breach – 2013

· http://www.foxnews.com/tech/2016/12/14/yahoo-confirms-more-than-one-billion-accounts-compromised-in-massive-data-breach.html

· http://money.cnn.com/2017/10/03/technology/business/yahoo-breach-3-billion-accounts/index.html

· https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html

Home Depot Breach – 2014

· https://www.bankinfosecurity.com/target-home-depot-breaches-lessons-a-7544

· https://www.reuters.com/article/us-home-depot-breach-settlement/home-depot-settles-consumer-lawsuit-over-big-2014-data-breach-idUSKCN0WA24Z

· http://fortune.com/2017/03/09/home-depot-data-breach-banks/

Equifax Data Breach – 2017

· https://www.washingtonpost.com/news/the-switch/wp/2018/03/01/equifax-keeps-finding-millions-more-people-who-were-affected-by-its-massive-data-breach/?utm_term=.93746bd982c3

· https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/nickclements/2018/03/05/equifaxs-enormous-data-breach-just-got-even-bigger/&refURL=https://www.google.com/&referrer=https://www.google.com/

· https://www.wired.com/story/equifax-breach-no-excuse/

Panera Bread Breach – 2017

· https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/

Facebook Breach – 2018

· https://abcnews.go.com/US/87-million-facebook-users-find-personal-data-breached/story?id=54334187

Under Armour Breach – 2018

· https://www.cnbc.com/2018/03/29/under-armour-stock-falls-after-company-admits-data-breach.html

Marriott Breach – 2018

· https://www.forbes.com/sites/thomasbrewster/2018/12/03/revealed-marriotts-500-million-hack-came-after-a-string-of-security-breaches/#9b6d37546f42

· NEW: Breach now tied to Chinese professional hackers:

https://www.cnn.com/2018/12/12/tech/chinese-marriott-hack/index.html

 

“Is this question part of your assignment? We Can Help!”


By Appointment was first posted on September 3, 2019 at 10:12 am.
©2019 "UK Best Writing". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at ukbestwriting@gmail.com

Source link

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


By Appointment was first posted on September 3, 2019 at 10:13 am.
©2019 "nursing Writers". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@lawwriters.org

 

"Are you looking for this answer? We can Help click Order Now"

UK BEST WRITING