Case Studies II and Cyber Response

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

Based on your case study 1 and additional cases studies attached, discuss the various cyber responses.

CASE STUDY 1:

Evil Corp is one of the most popular cybercrime organizations worldwide due to its numerous attacks in the past decade (2010-2020). Evil Corp is led by Russians Maksim Yakubets and Igor Turashev, who were yet to face charges until 2019 in the US. The level of sophistication of the group is yet to be figured out correctly as the cybercrime organization is thought to have very close ties with the Russian intelligence agency (FSB). It is thought that some of the most gruesome attacks on companies in the US and the UK by the group were actions on behalf of the FSB. According to Arghire (2021), Evil Corp is still active in the hacking business despite the indictment of its lead members in the US, just that it might have evolved into corporate spying activities.

Some of the most memorable attacks perpetrated by Evil Corp are in the banking sector. They have stolen millions of dollars from unsuspecting banks. A banking Trojan known as Dridex developed by Evil Corp harnessed the confidential details of bank customers in the US as soon as they clicked on phishing emails. The scheme affected computers globally where American banks operate, leading to a loss of $100 million. In another attack by Evil Corp, the software used was known as ‘botnet.’ It would freeze a computer’s operating system leading to a malware spread where the hackers would transfer money from victims to their overseas accounts. The US department of justice also believes that Evil Corp’s malware named ‘Zeus’ and ‘Bugat’ transferred over $70 million from US individuals, some pensioners.

References

Allyn, B. (2019). Russian Hacking Group Evil Corp. Charged by Federal Prosecutors in Alleged Bank Fraud. Retrieved from https://www.npr.org/2019/12/05/785034567/russian-hacking-group-evil-corp-charged-by-federal-prosecutors-in-alleged-bank-f

Arghire, I (2021). Understanding Russia’s Evil Corp cybercrime organization. Retrieved from https://www.securityweek.com/russian-evil-corp-cybercriminals-possibly-evolved-cyberspies

Sanger, D. E., &Perlroth, N. (2020). Russian criminal group finds a new target: Americans working at home. New York Times.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research paper week 5 develop a computer and internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 **** Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, Use Calibri, 11 pt not including the required cover page and reference page. Try dividing your paper into section with section headers.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. 

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS498 Project Plan

Week 1 Assignment – Introduction to Project Management Tools Activity

Overview

The purpose of this activity is to expose you to the Microsoft Project tool for the purpose of developing a project plan and Gantt chart for a hypothetical 30-day hobby project of your choice. Examples include building a deck, painting the garage, or planting a vegetable garden. Completing this activity will help to jump start your successful completion of the project deliverables throughout the course.

This activity consists of two parts:

Part 1: Project Introduction, or Project Plan

You will write a 3–5-page document outlining the project specifics, such as its key objectives and scope, functional and technical requirements, key components, etc.

Part 2: Gantt Chart

You will use Microsoft Project to create a Gantt chart for your hobby project. Download Microsoft Project to your computer if you don’t already have it installed and familiarize yourself with its features.

  • Note: Microsoft Project is available at no cost to Strayer University students. For more information, refer to the left-hand menu option titled “Microsoft Azure for Education.” This information is also available via iCampus
  • You are to create or assume all necessary assumptions to successfully complete this activity.
  • You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.

Instructions

Part 1: Project Introduction or Project Plan

Write a 3–5-page project plan in which you:

  1. Document the hobby project’s key objectives and scope.
  2. Develop the hobby project’s functional and technical requirements.
  3. Design the hobby project’s components, including size, shape, and quality.
  4. Implement the project according to the chosen design and components.
Part 2: Gantt Chart

Use Microsoft Project to create a Gantt chart identifying the major and minor tasks, illustrating dependency relationships between activities.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for the project plan portion of your activity to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • You are not required to include a source list page for this introductory activity. You will, however, be responsible for citing sources and including a source list page for all of the course project deliverables

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Executive Summary on Risk Analysis

  

Refer to the Case Scenario: Premiere Collegiate School” text sheet provided. Use the scenario and the table discussed below to create an asset list with quantitative values to be used in the analysis. Quantitative values are arrived at by examining numerical, measurable characteristics such as original cost and cost of replacement. Students should rank the importance of each asset, based on the importance to the school, and justify their ranking.

See the attached file

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

R assignment

 Review The Power of Good Design and   select three of the ten principles noted for good design. Next in R,   utilize these three principles in a problem that you will solve. First   note the problem to solve, the dataset (where the information was  pulled  from), and what methods you are going to take to solve the  problem.   Ensure the problem is simple enough to complete within a  two-page  document. For example, I need to purchase a house and want to  know what  my options are given x amount of dollars and x location based  on a  sample of data from Zillow within each location. 
Ensure there is data visualization in the homework and note how it relates to the three principles selected. 

The link for The Power of Good Design:

https://www.vitsoe.com/gb/about/good-design

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Physical Security and Threats discussion

  

Many business environments have both visible and invisible physical  security controls. You see them at the post office, at the corner store,  and in certain areas of your own computing environment. They are so  pervasive that some people choose where they live based on their  presence, as in gated access communities or secure apartment  complexes. Alison is a security analyst for a major technology  corporation that specializes in data management. This company includes  an in house security staff (guards, administrators, and so on) that  is capable of handling physical security breaches. Brad experienced an  intrusion—into his personal vehicle in the company parking lot. He asks  Alison whether she observed or recorded anyone breaking into and  entering his vehicle, but this is a personal item and not a company  possession, and she has no control or regulation over damage to employee  assets. This is understandably unnerving for Brad, but he  understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Malware Attack

Playbooks, sometimes known as Standard Operating Procedures (SOPs) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions. 

During weeks 2, 3, and 5, you will develop individual playbooks for a fictional company that hired you to write their playbooks and manage the team. The first playbook is a response to malware found at the company. Each week is a separate playbook and needs to have a cover page and references.

Outline a 2- to 3-page playbook in Microsoft Word or Word Compatible to address a category of malware attacks of your choice. 

Complete the following in your playbook: 

  • Provide details of the malware category.
  • Identify the expected vulnerability and attack vector. 
  • Analyze the vulnerability to determine 2 risks of this malware. 
  • Outline step-by-step instructions on how to resolve the malware attack. 

Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps and guidelines. 

Cite at least 2 resources to support your assignment. 

Format your assignment according to APA guidelines. 

Review Rubric to assure all requirements are met.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Problem 3- Legal

Question I – The appellate court decides that the trial court committed reversible error by including evidence found by law enforcement.  Law enforcement discovered this evidence when committing a Fourth Amendment violation, which should have been excluded at trial.  This inadmissible evidence was the lynchpin of the prosecutor’s case, which resulted in a conviction.  Where does the case go from here? Is the Defendant free to go? Does it go back to the trial court? Does it go all the way up to the Supreme Court?

Question II – Lonnie dies while working on a barge.  Lonnie’s widow sues the barge company in state court. The Parties agree on the facts and cause of Lonnie’s death; however, they do not agree whether the Longshoreman Act should apply to this case.  Lonnie’s widow has already received a remedy in a separate administrative action as part of a workers’ compensation claim.  The Longshoreman Act would allow the decedent’s family to pursue an action in court, even if the family has agreed to a settlement as part of the worker’s compensation action.  If the Longshoreman Act does not apply, then the decedent’s family will have no remedy in court.  Prior to trial, what motion should the barge company’s attorney make?  What must this attorney prove in order for her motion to be successful?

Text-

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Operational excellence

Discussion (250-300 words):

 This week we focus on globalization concepts.  Please explain the concept of globalization and the role information technology has in the global market. 

Assignment (2 Pages):

 Information Systems for Business and Beyond Questions

  • Chapter 11 – study questions 1-10, Exercise 1
  • Chapter 12 – study questions 1-11, Exercise 1

Information Technology and Organizational Learning Assignment:

  • Chapter 9 – Review the section on Establishing a Security Culture.  Review the methods to reduce the chances of a cyber threat noted in the textbook.  Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.
  • Chapter 10 – Review the section on the IT leader in the digital transformation era.  Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate.  What are some methods or resources leaders can utilize to enhance their change attitude?

Practical connection assignment (3 pages):

 This week select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities:

  • Name the organization and briefly describe what good or service they sell and where they operate. Consider using an organization that is in an industry where you work or want to work. (Exclude the use of Apple, Amazon, Facebook/Meta, Microsoft and Google).
  • Note how they are a differentiator in the market.
  • Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).
  • Explain what actions the company took to achieve operational excellence.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 3 Assignment: Smith, Smith, Smith and Smith

See attached File APA Format

Smith, Smith, Smith, and Smith is a regional accounting firm that is putting up a new headquarters building. The building will have a backbone network that connects eight LANs (two on each floor). The company is very concerned with network errors. Write a 2-3 page paper on what advice you would give regarding the design of the building and network cable planning that would help reduce network errors. Create a network diagram based on your suggestions for the company. 

See the attached document for complete instructions and grading rubric. Submit your completed assignment to the above submission link by 11:59 p.m. EST, Sunday of Unit 3.FitzGerald, J., Dennis, A., & Durcikova, A. (2021). Business data communications and networking. Hoboken, NJ: Wiley. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now