Description

Description

Analyzing cubersecurity case in term of the cause, security failures, impact, and what could have been done differently to prevent or mitigate the attack.Then make presentation about the case study to present it to audiance.
Please follow the description and instrucation that available in the attached file and put the answer after each question.

College of Computing and Informatics

Project
Deadline: Day 01/12/2024 @ 23:59
[Total Mark is 14]
Student Details:

CRN:

Name:
Name:
Name:

ID:
ID:
ID:

Instructions:

• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.

• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).

• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.

• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.

• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.

Restricted – ‫مقيد‬

Description and Instructions

Pg. 01

Description and Instructions
Project Description:
This project is an opportunity for you to practice your knowledge and skills. Here are
several cybersecurity cases each case highlights a different aspect of cybersecurity.
You should choose one case as a group and analyze the case in terms of the cause,
security failures, impact, and what could have been done differently to prevent or
mitigate the attack.
After that, each group should Make a presentation. Presentations begin in the ninth
week.
Total Marks = 14
Presentation

Project File

5 marks

5 marks

Answer your colleagues’
questions.
4 marks

Group Size = maximum 3 members.

The chosen case should be divided between members of the group.

Each member must present his part.

Marks will be awarded based on your explanation, the quality of the content, your
discussion skills, and the correctness of your answers.

The students must answer the questions in this activity individually to get discussion
marks

One group member (group leader) should submit Project File and Presentation
Slides on Blackboard.

Presentation Marking Criteria:

Restricted – ‫مقيد‬

Pg. 02

Description and Instructions

Complete content (Introduction, body, and conclusion)

3 marks

Effective use of time (max. 8-10 minutes)

1 mark

Voice projection and loudness/ Eye contact/ Confidence and 1 mark
attitude

Restricted – ‫مقيد‬

Description and Instructions

Pg. 03

Capital One Data Breach (2019)

Learning
Outcome(s):
CLO1: Explain
networking and
security, security
issues, trends,
and security

Case Summary:
In 2019, a former Amazon Web Services (AWS) employee exploited a misconfigured
firewall in Capital One’s cloud infrastructure, leading to a data breach that exposed
sensitive information of over 100 million customers. The breach involved personal data
such as names, addresses, credit scores, and bank account information.
Key Questions for Analysis:

CLO2: Apply
effective, proper,

1. How did a misconfigured cloud infrastructure contribute to this breach, and

and state-of-the-

what could Capital One have done to secure its cloud environment?

art security tools

2. What role does cloud security and shared responsibility between cloud

and technologies.

providers and customers play in preventing breaches?
3. Analyze the importance of securing sensitive data in cloud environments with

CLO6:
Demonstrate
processes to
implement and
enforce policy

proper encryption and access controls.
4. How should organizations secure hybrid cloud environments, especially when
handling sensitive financial information?
5. Critique Capital One’s incident response and the role of cloud security audits in
preventing future breaches.

Restricted – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Description

Description CT Digital Health Technologies in KSA (110 points) Evaluate the use of digital health technologies in Saudi Arabia that would support expanding patient access to medical care by researching a minimum of four peer-reviewed articles on this topic and then creating a brochure or infographic using appropriate templates available

Description

Description IMC campaign plan An IMC campaign plan involves the integration of different marketing communication tools such as advertising, public relations, direct marketing, sales promotion, and digital marketing to achieve marketing objectives. For this critical thinking assignment select one of the following scenarios to create an integrated marketing communications plan

Description

Description I want the answer without similarity at all, and Conceptual and professional, they’re important. I have a solution model ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment-3 MGT324-Public Management Due Date: 26/04/2025

Description

Description Students are advised to make their work clear and well presented, marks may be reduced for poor presentation. Avoid plagiarism, the work should be in your own words, copying from students or other resources without proper referencing will result in ZERO marks. No exceptions. All answered must be typed

Description

Description I want the answer without similarity at all, and Conceptual and professional, they’re important. I have a solution model ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Quality Management (MGT 424)

Description

Description Dis 1. one file. Efficiency and effectiveness are essential to controlling costs and quality in healthcare organizations. Research the global and national accreditation bodies working to accredit facilities in Saudi Arabia. Choose one of these agencies; evaluate the agency and its effect on healthcare organizations. Dis 2 Module 13:

Description

Description the title 68Ga-DOTA-TOC-injection (EP) in NETs arised from neuroendocrine cells the reference more than4 Vancouver style follow the rubric in the file Students Case Study Rubric Course: RNM 417 Student: ……………………………………………. Case study title: ………………………………..…… Criteria Needs Unsatisfactory (1) Satisfactory (3) Improvement Excellent (4) (2) 1. Patient’s Minimal Basic

Description

Description write case study about this title [18F]NaF is used in blood flow studies reference more than 4Vancouver follow the rubric in the file make sure 0% AI

Description

Description Action Items An e-mail is sent to Party B, in order to form a contract. Party A is the sender of the email. Party A’s identification is located at the top of the e-mail and is sufficient to show authentication. Will use of the individual’s initials or name at

Description

Description Kindly review the attached document for your assistance in explanation and answer and please note that the deadline is on 26 of April at 00:00, KSA timing. Your usual assistance in highly appreciated. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi

Description

Description General Instructions – PLEASE READ THEM CAREFULLY The Assignment must be submitted on Blackboard (WORD format only) via the allocated folder. Assignments submitted through email will not be accepted. Students are advised to make their work transparent and well-presented; marks may be reduced for poor presentation. This includes filling

Description

Description The Assignment must be submitted on Blackboard (WORD format only) via the allocated folder. Assignments submitted through email will not be accepted. Students are advised to present their work clearly and well, as marks may be reduced for poor presentation. This includes filling in your information on the cover

Description

Description see Communications an Operations Securit (COMSEC & OPSEC) Introduction to Communications Security (COMSEC) & Operations Security (OPSEC) SECURITY ● Communications Security (COMSEC) secures data transmission through encryption and secure channels. ● Operations Security (OPSEC) protects daily operations by enforcing security policies and protocols. ● Both approaches prevent unauthorized access,

Description

Description College of Administration and Finance Sciences Form No 4- Internship Report Cover Page Student`s name: Student`s ID #: Training Organization: Trainee Department: Field Instructor Name: Field Instructor Signature: Course Title: Internship-MGT430 CRN: 25422 Internship Start Date: Internship End Date: Academic Year/Semester:2024-2025/2nd For Instructor’s Use only Instructor’s Name: Dr. Sager

Description

Description I have an Assignment for SKL401 I need your help to solve it do as instructed , Important Notes: Keep your total submission to one page only. Make sure your work is your own. please no AI (chat gpt .. etc) SKL401 – Assignment #3 Topic: Market Analysis Deadline

Description

Description Students are advised to make their work clear and well presented; marks may be reduced for poor presentation. This includes filling your information on the cover page. • Students must mention question number clearly in their answer. • Late submission will NOT be accepted. • Avoid plagiarism, the work

Description

Description Students are advised to make their work clear and well presented; marks may be reduced for poor presentation. This includes filling your information on the cover page. • Students must mention question number clearly in their answer. • Late submission will NOT be accepted. • Avoid plagiarism, the work

Description

Description Students are advised to make their work clear and well presented; marks may be reduced for poor presentation. This includes filling your information on the cover page. • Students must mention question number clearly in their answer. • Late submission will NOT be accepted. • Avoid plagiarism, the work