Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Paper Notes (delete these notes when you submit the paper)

• Use this paper template; do not change it.

• Put all students' names on the title page.

• Use full sentences (except for the main table).

• Use 12 pt, Calibri font; double space

• At least 8 references must be used

• Use APA format for in-text references and the reference list.

• You are not allowed to copy any sentences from a source. No full quotes are allowed. Any plagiarism in a group's paper will result in the whole group receive a failure (F) for the assignment.

Title Page (1 page)

Title: Create a Title for your Paper

Authors: List Authors' Full Names

Section 1. Attack Summary(2 page, double spaced)

• Introduce the cyber incident

• State what your group knew about this attack before starting the paper (even if it's nothing that's fine)

• Describe how the attack works.

• Describe what types of systems and or software are affected

• Describe the overall impact of the attack (could be information like number of countries impacted, number of companies impacted, number of people impacted)

• Describe how it impacts organizations, companies or people (for example, may it causes a denial of service and companies can't use certain systems, maybe it causes all Windows programs to shutdown etc.)

• Describe other interesting things you have found about this incident.

• Use 8 references

Section 2. Visual Representation (1 page, double spaced)

• Provide a high level visual either about how the attack works or that shows the impact of the attack (if can be a graph, a map or some other visual). Remember to cite the source.

• Describe the visual in at least 3 sentences.

Section 3. Table (1 pages, double spaced)

• Create a table consisting of ten pieces of the most interesting information you found out about the cyber incident. You pick the fields that go into the table; you can use things from section 1 as a guide.

Section 3. Group Reflection (1 page, double spaced)

• DO NOT USE ANY SOURCES FOR THIS PART.

• Answer this question: how has your view about cyber security overall changed because of what you learned from your topic? Do not explain concepts to me.

Examples could be: your group is more scared than it was before, or maybe your group is now more aware that cyber attacks can spread more quickly or maybe your group feels that no one is truly safe from cyber attacks...

Section 4. References (1 page)

• List references in APA format.

Presentation Guidelines:

• PPT requirements

• Title slide: all group members who were present at the residency

• Introduction slide: state the name and overall description of the attack

• Impact slide: what were the high level impacts (number of countries, companies and/or individuals impacted), costs incurred because of the attacks etc.

• Attack description slide: describe how the attack works

• Systems/software impact slide: state what systems and/or software are impacted

• Interesting points: describe three most interesting things about your attack that your group found

• Group reflection: how has your group's view about cyber security or attacks changed because of this assignment

• Reference slide: reference list from your paper can be put here

• Presentation tips:

• 10 minutes long

• Limit the text on the slides, do not read slides

• Use visuals as much as possible vs text

• Any group member should be able to give the PPT, make sure each group member has learned about the topic

• Only one group member needs to present the PPT; the group members who do not present will be asked a question by the professor

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93058776
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Management Information System

Discussfor this assignment research a company large or

Discuss For this assignment, research a company, large or small, that has taken advantage of the recent technological advances developed in information systems to grow the E-commerce-side of the business. In what ways ha ...

In this assignment you will create a presentation for your

In this assignment, you will create a presentation for your organization to explain how successful collaboration can improve success and provide competitive advantages. Scenario: Your organization has used a variety of c ...

Wireless transmission please respond to the followingdear

"Wireless Transmission" Please respond to the following: Dear student, The following website may help you to start the week 3 discussion: The topic is: Wireless communication system and method of controlling transmission ...

Identifying and analyzing vulnerabilities please respond to

"Identifying and Analyzing Vulnerabilities" Please respond to the following: Assess the effectiveness of offering a reward to individuals external to the organization in exchange for them to identify vulnerabilities on a ...

In your role as information security consultant create a

In your role as information security consultant, create a strategy for an effective user training, access, and account management program for the project organization. This strategy should include the following component ...

Assignmentread the article titled when stuxnet hit the

Assignment Read the article titled "When Stuxnet Hit the Homeland: Government Response to the Rescue," from ABC News, threat in terms of incident response and recovery procedures. Write a three to four (3-4) page paper i ...

Managing services and securitytaskyour job in this

Managing Services and Security Task Your job in this assignment is to create two Virtual machines each running a different but the latest distribution of Linux e.g. Ubuntu Server and CentOS. Each of these VM's is to offe ...

1discussion 1your state has a forthcoming referendum

1. Discussion 1: Your state has a forthcoming referendum concerning no smoking in public places including bars and restaurants. Follow the ten steps on page 137 on negotiation planning. 2. Discussion 2: I. Understanding ...

Question suppose dr smart has designed a 4des cipher which

Question : Suppose Dr. Smart has designed a 4DES cipher which encrypts data m in the following way: c= Dk4(Dk3(Ek2(Ek1(m)))), where E and D denote the encryption and decryption operation of DES. To break this cipher and ...

1 a major hurricane has struck the area where your company

1. A major hurricane has struck the area where your company has its central data center. There offsite backups and hardware at three other centers around the country. 2. Assume that the area is suffering greatly from the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As