For the organization you selected in Module 1: Case Study Milestone 1, consider

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

For the organization you selected in Module 1: Case Study Milestone 1, consider

For the organization you selected in Module 1: Case Study Milestone 1, consider your answers to Discussion 4: You’ve Been Hacked! Craft a summary including the details of the breach and what you and the organization are doing to identify, isolate, and remedy that hack. Executive summaries are brief summary statements that are clearly and plainly written to show upper management the main points of a situation so that they need not read an entire report or brief on a matter. Imagine that you only have one hour to brief the entire organizational board (CEO, CSO, CFO, etc.) on the situation and they will need part of that hour to ask questions on what you present. This is not a paper. It is a very brief, complete (including what you do and do not know) statement of the situation up to this point in time.
Consider the elements from the discussion question:
You discover the organization had been hacked (and may still be under attack).
You have no idea how long this has been going on, the level of damage, the persistence of the hack, and what (if anything) has been compromised.
You have learned that some hackers may gain access to network resources and stay relatively inactive until there is something of value to steal or exploit. Other hackers seek to embarrass or steal quickly, hoping to have immediate benefit from the access gained. You do not know which type of situation you have, what type of hacker(s) you are dealing with, if it is a lone instance or if there are multiple exploits across your organization’s vast network.
You found a way to answer at least some of these questions quickly. While you may not have all the answers, you have identified some characteristics of this hack and need a plan to move forward, which must include isolation of all access and compromised systems, identification of hacking methods used (i.e. what was successful and what was not), and if the hack is a compromise that must be reported per the governance required of your type of business or industry.
Share your basic plan for identifying the extent of the damage/access/breach. Who/what has hacked your organization? What was the goal? What can you do to immediately triage the organization’s network? What specific steps can be taken? Who should be notified? Do you alert your customers/patients/students/stakeholders?
The following resource may be helpful in learning what to include and what tone to use for the summary of the hack. It also shows how to write a marketing executive summary but much of the basics and mechanics apply to the summary of the hack. https://www.inc.com/guides/2010/09/how-to-write-an-executive-summary.html
***My chosen topic for my ongoing assignment is digital forensics. For continuity I’ve attached my module 1 case study as mentioned above. I’ve also attached my other two assignments to ensure the respective individuals are utilized for their chosen roles i.e. CEO, CSO etc.***

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now