Description

Description

Analyzing cubersecurity case in term of the cause, security failures, impact, and what could have been done differently to prevent or mitigate the attack.Then make presentation about the case study to present it to audiance.
Please follow the description and instrucation that available in the attached file and put the answer after each question.

College of Computing and Informatics

Project
Deadline: Day 01/12/2024 @ 23:59
[Total Mark is 14]
Student Details:

CRN:

Name:
Name:
Name:

ID:
ID:
ID:

Instructions:

• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.

• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).

• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.

• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.

• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.

Restricted – ‫مقيد‬

Description and Instructions

Pg. 01

Description and Instructions
Project Description:
This project is an opportunity for you to practice your knowledge and skills. Here are
several cybersecurity cases each case highlights a different aspect of cybersecurity.
You should choose one case as a group and analyze the case in terms of the cause,
security failures, impact, and what could have been done differently to prevent or
mitigate the attack.
After that, each group should Make a presentation. Presentations begin in the ninth
week.
Total Marks = 14
Presentation

Project File

5 marks

5 marks

Answer your colleagues’
questions.
4 marks

Group Size = maximum 3 members.

The chosen case should be divided between members of the group.

Each member must present his part.

Marks will be awarded based on your explanation, the quality of the content, your
discussion skills, and the correctness of your answers.

The students must answer the questions in this activity individually to get discussion
marks

One group member (group leader) should submit Project File and Presentation
Slides on Blackboard.

Presentation Marking Criteria:

Restricted – ‫مقيد‬

Pg. 02

Description and Instructions

Complete content (Introduction, body, and conclusion)

3 marks

Effective use of time (max. 8-10 minutes)

1 mark

Voice projection and loudness/ Eye contact/ Confidence and 1 mark
attitude

Restricted – ‫مقيد‬

Description and Instructions

Pg. 03

Capital One Data Breach (2019)

Learning
Outcome(s):
CLO1: Explain
networking and
security, security
issues, trends,
and security

Case Summary:
In 2019, a former Amazon Web Services (AWS) employee exploited a misconfigured
firewall in Capital One’s cloud infrastructure, leading to a data breach that exposed
sensitive information of over 100 million customers. The breach involved personal data
such as names, addresses, credit scores, and bank account information.
Key Questions for Analysis:

CLO2: Apply
effective, proper,

1. How did a misconfigured cloud infrastructure contribute to this breach, and

and state-of-the-

what could Capital One have done to secure its cloud environment?

art security tools

2. What role does cloud security and shared responsibility between cloud

and technologies.

providers and customers play in preventing breaches?
3. Analyze the importance of securing sensitive data in cloud environments with

CLO6:
Demonstrate
processes to
implement and
enforce policy

proper encryption and access controls.
4. How should organizations secure hybrid cloud environments, especially when
handling sensitive financial information?
5. Critique Capital One’s incident response and the role of cloud security audits in
preventing future breaches.

Restricted – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Description

Description FORUM DESCRIPTION Research a Saudi Arabian healthcare law regulating the industry. Identify the stakeholders affected by the regulation and analyze the role the stakeholders play in the healthcare industry. Assess the regulation’s impact on the quality, cost, and access of healthcare in Saudi Arabia.

Description

Description Executive Master in Healthcare Quality and Patient Safety HQS590 Capstone Project The Role of Artificial Intelligence in Early Disease Detection and Management in Saudi Arabia: A Systematic Review A Capstone Project Submitted in Partial fulfillment of the Requirements for the Degree of Executive Master in Healthcare Quality and Patient

Description

Description V. Executive Master in Healthcare Quality and Patient Safety HQS590 Capstone Project The Role of Artificial Intelligence in Early Disease Detection and Management in Saudi Arabia: A Systematic Review A Capstone Project Submitted in Partial fulfillment of the Requirements for the Degree of Executive Master in Healthcare Quality and

Description

Description I need to add results and discussion. the methodology. Executive Master in Healthcare Quality and Patient Safety HQS590 Capstone Project The Role of Artificial Intelligence in Early Disease Detection and Management in Saudi Arabia: A Systematic Review A Capstone Project Submitted in Partial fulfillment of the Requirements for the

Description

Description I made some changes to the methodology. The rest of the results and instructions, if you can do them? Executive Master in Healthcare Quality and Patient Safety HQS590 Capstone Project The Role of Artificial Intelligence in Early Disease Detection and Management in Saudi Arabia: A Systematic Review A Capstone

Description

Description 1- Which of the following sequences of actions are within the set of behaviours described by the Activity Diagram shown below? Please justify your answer if it is negative. a. ABC b. BACBD c. ABD d. ABCD e. BBCD 2- Model a door using a UML State Machine diagram,

Description

Description Hi, you are working in construction company which has two department ” Energy sector, building and infrastructure sector”. You are the procurement manager and the executive management has a vision of improvement their work to meet the sustainability vision of Saudi 2030 vision. You, as procurement manager, what you

Description

Description See ‫كلية العلوم الطبية التطبيقية‬ ‫قسم علوم المختبرات االكلينيكية‬ ‫جامعة أم القرى‬ ‫ هـ‬1446 ‫العام الجامعي‬ III Diagnostic Microbiology Assignment Second Semester (1446H) You can choose one of the following: 1- Group presentation (Max 2 students per topic) Or 2- Written assignment (Max one student per topic) Assignment: Group

Description

Description For Instructor’s Use only Instructor’s Name: Total Training Hours /280 Students’ Grade: Marks Obtained /30 Level of Marks: High/Middle/Low Academic Report Guideline(Co-op) (please do not include this text in the final report, just follow its guidelines and use the cover page above) The report should be submitted within two

Description

Description 1 Customer Insights in Payment Processing Solutions in The Case of PayTabs Student’s Name Institution Instructor’s Name Course date 2 Customer Insights in Payment Processing Solutions in The Case of PayTabs PayTabs provides a perfect example of how a payment processing solutions business can shine by focusing on the

Description

Description ssee 37. What is the output of the following code after clicking the apply button ? Coffee Tea Milk “Apply” function myFunction() { const element = document.getElementById(“myList”).children[0]; const newNode = document.createTextNode(“Water”); element.replaceChild(newNode, element.childNodes[0]); } 38. Below is a JavaScript code. Write the exact output that will be generated when

Description

Description Aim The primary aim of this project is to strengthen emergency preparedness and response capabilities for epidemics and pandemics at a tertiary care hospital in Saudi Arabia by implementing evidence-based protocols, targeted staff training, enhanced surveillance systems, and optimised patient flow strategies. Objectives 1. Upgrade surveillance and triage systems

Description

Description Aim The primary aim of this project is to strengthen emergency preparedness and response capabilities for epidemics and pandemics at a tertiary care hospital in Saudi Arabia by implementing evidence-based protocols, targeted staff training, enhanced surveillance systems, and optimised patient flow strategies. Objectives 1. Upgrade surveillance and triage systems

Description

Description Aim The primary aim of this project is to strengthen emergency preparedness and response capabilities for epidemics and pandemics at a tertiary care hospital in Saudi Arabia by implementing evidence-based protocols, targeted staff training, enhanced surveillance systems, and optimised patient flow strategies. Objectives 1. Upgrade surveillance and triage systems

Description

Description Aim The primary aim of this project is to strengthen emergency preparedness and response capabilities for epidemics and pandemics at a tertiary care hospital in Saudi Arabia by implementing evidence-based protocols, targeted staff training, enhanced surveillance systems, and optimised patient flow strategies. Objectives 1. Upgrade surveillance and triage systems

Description

Description Aim The primary aim of this project is to strengthen emergency preparedness and response capabilities for epidemics and pandemics at a tertiary care hospital in Saudi Arabia by implementing evidence-based protocols, targeted staff training, enhanced surveillance systems, and optimised patient flow strategies. Objectives 1. Upgrade surveillance and triage systems

Description

Description I want the solution to be clear and not repetitive and to write the references in a correct way. Course Name: Internship Student’s Name: Course Code: MGT430 Student’s ID Number: Semester: CRN: Academic Year: 2022-2023 For Instructor’s Use only Instructor’s Name: Students’ Grade: Restricted – ‫مقيد‬ Level of Marks:

Description

Description Aim The primary aim of this project is to strengthen emergency preparedness and response capabilities for epidemics and pandemics at a tertiary care hospital in Saudi Arabia by implementing evidence-based protocols, targeted staff training, enhanced surveillance systems, and optimised patient flow strategies. Objectives 1. Upgrade surveillance and triage systems