Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

IT Security & Policies (IT476) Cybersecurity case “Capital One Data Breach (2019)”.

Description

Analyzing cubersecurity case in term of the cause, security failures, impact, and what could have been done differently to prevent or mitigate the attack.Then make presentation about the case study to present it to audiance.
Please follow the description and instrucation that available in the attached file and put the answer after each question.

College of Computing and Informatics

Project
Deadline: Day 01/12/2024 @ 23:59
[Total Mark is 14]
Student Details:

CRN:

Name:
Name:
Name:

ID:
ID:
ID:

Instructions:

• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.

• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).

• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.

• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.

• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.

Restricted – ‫مقيد‬

Description and Instructions

Pg. 01

Description and Instructions
Project Description:
This project is an opportunity for you to practice your knowledge and skills. Here are
several cybersecurity cases each case highlights a different aspect of cybersecurity.
You should choose one case as a group and analyze the case in terms of the cause,
security failures, impact, and what could have been done differently to prevent or
mitigate the attack.
After that, each group should Make a presentation. Presentations begin in the ninth
week.
Total Marks = 14
Presentation

Project File

5 marks

5 marks

Answer your colleagues’
questions.
4 marks

Group Size = maximum 3 members.

The chosen case should be divided between members of the group.

Each member must present his part.

Marks will be awarded based on your explanation, the quality of the content, your
discussion skills, and the correctness of your answers.

The students must answer the questions in this activity individually to get discussion
marks

One group member (group leader) should submit Project File and Presentation
Slides on Blackboard.

Presentation Marking Criteria:

Restricted – ‫مقيد‬

Pg. 02

Description and Instructions

Complete content (Introduction, body, and conclusion)

3 marks

Effective use of time (max. 8-10 minutes)

1 mark

Voice projection and loudness/ Eye contact/ Confidence and 1 mark
attitude

Restricted – ‫مقيد‬

Description and Instructions

Pg. 03

Capital One Data Breach (2019)

Learning
Outcome(s):
CLO1: Explain
networking and
security, security
issues, trends,
and security

Case Summary:
In 2019, a former Amazon Web Services (AWS) employee exploited a misconfigured
firewall in Capital One’s cloud infrastructure, leading to a data breach that exposed
sensitive information of over 100 million customers. The breach involved personal data
such as names, addresses, credit scores, and bank account information.
Key Questions for Analysis:

CLO2: Apply
effective, proper,

1. How did a misconfigured cloud infrastructure contribute to this breach, and

and state-of-the-

what could Capital One have done to secure its cloud environment?

art security tools

2. What role does cloud security and shared responsibility between cloud

and technologies.

providers and customers play in preventing breaches?
3. Analyze the importance of securing sensitive data in cloud environments with

CLO6:
Demonstrate
processes to
implement and
enforce policy

proper encryption and access controls.
4. How should organizations secure hybrid cloud environments, especially when
handling sensitive financial information?
5. Critique Capital One’s incident response and the role of cloud security audits in
preventing future breaches.

Restricted – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

DB – Summary Thoughts on Organizational Change

Description Module 14: Summary Thoughts on Organizational Change Throughout this course, we have learned that change is inevitable. As things change, we have less ability to control exactly where they will change and how quickly they will change. Organizations can, however, take some action to address change. In this module,

Accounting Question

Description ‫دبلوم إدارة األعمال‬ ‫مقرر مبادئ المحاسبة‬ ‫اسم الطالب‪/‬ة ‪:‬‬ ‫الرقم األكاديمي‪:‬‬ ‫أ‪ .‬تركي سعيد القحطاني‬ ‫دبلوم إدارة األعمال‬ ‫مقرر مبادئ المحاسبة‬ ‫اسم الطالب‪/‬ة ‪:‬‬ ‫الرقم األكاديمي‪:‬‬ ‫أ‪ .‬تركي سعيد القحطاني‬ Purchase answer to see full attachment

Dis.

Description For this week’s discussion, please think about your professional role and organization. one file What trends in your profession are you most excited about? What are some future challenges in healthcare human resources management that you see for your profession? Your organization? Based on what you have learned in

Project Managemen / MGT323

Description eneral Instructions – PLEASE READ THEM CAREFULLY • The Assignment must be submitted on Blackboard (WORD format only) via allocated folder. • Assignments submitted through email will not be accepted. • Students are advised to make their work clear and well presented, marks may be reduced for poor presentation.

Management Question

Description This assignment is an individualassignment. • Due date for Assignment 3 is 30/11/2024. • The Assignment must be submitted on BB only in WORD format via allocated folder. • Assignments submitted through email will not be accepted. • Students are advised to make their work clear and well presented;

Module 13 ECON DB: Exchange Rate Systems and Currency Crises

Description Module 13 ECON DB: Exchange Rate Systems and Currency Crises Currency Devaluation Discuss the purpose of a currency devaluation? What about a currency revaluation? Under what circumstances should a nation devalue currency? Identify a developing country that adopted currency boards? Discuss why they chose this instead of dollarizing their

Public Health Question

Description ACT-500: Managerial Accounting XXXXXX-Riyadh-Males Module 12: Critical Thinking Assignment Capital Investment Analysis (100 points) Student’s Name: XXXXXXX Student’s ID Number: XXXXXXX Course Code: ACT500 CRN: XXXXXX Academic Year: 2024 – 2025 Term: First Semester Instructor Name: XXXXXXX Prepared Date: 19 November 2024 ACT-500: Managerial Accounting XXXXXX-Riyadh-Males Module 12: Critical

final report

Description I need a presentation after two days College of Administration and Finance Sciences Form No 4- Internship Report Cover Page Student`s Name: Student`s ID: Trainee Department: Training Organization: Field Instructor Signature: Field Instructor Name: Course Title: MGT 430 Internship Start Date: CRN Internship End Date: Academic Year/Semester: For Instructor’s

Final report

Description Course Name: Internship Student’s Name: Course Code: MGT430 Student’s ID Number: Semester: CRN: Academic Year: 2022-2023 For Instructor’s Use only Instructor’s Name: Students’ Grade: Restricted – ‫مقيد‬ Level of Marks: Secondary address separator Restricted – ‫مقيد‬ Restricted – ‫مقيد‬ Secondary address Restricted – ‫مقيد‬ Text Text Text Text Restricted

362 ass 1r

Description see ASSIGNMENT COVER SHEET Course name: Workplace Health Promotion Course number: PHC362 CRN: Assignment title or task: (You can write a question) How workplace health promotion programs improve productivity and why some groups are more vulnerable to discrimination, harassment, and stigmatization which lead to stress at the workplace? (Support

362 ass 4r

Description see ASSIGNMENT COVER SHEET Course name: Workplace Health Promotion Course number: PHC362 CRN: Assignment title or task: (You can write a question) How workplace health promotion programs improve productivity and why some groups are more vulnerable to discrimination, harassment, and stigmatization which lead to stress at the workplace? (Support

362 ass 5r

Description see ASSIGNMENT COVER SHEET Course name: Workplace Health Promotion Course number: PHC362 CRN: Assignment title or task: (You can write a question) How workplace health promotion programs improve productivity and why some groups are more vulnerable to discrimination, harassment, and stigmatization which lead to stress at the workplace? (Support

Database Management

Description Questions regarding database management using MySql College of Computing and Informatics Project Deadline: Day 4/12/2024 @ 23:59 [Total Marks for this Assignment is 14] Student Details: CRN: Name: ### Name: ### Name: ### Name: ### ID: ### ID: ### ID: ### ID: ### Instructions: • You must submit two

Project Management

Description Projects are unique, one-time operations designed to accomplish a set of objectives in a limited time frame (Stevenson, 2021). Give three examples of unethical conduct involving project management as well as the ethical principle each one violates. Analyze the potential long-term consequences of unethical project management practices on an

Final report and presentation Mohammed

Description APPENDIX 4 Academic Report Guideline (Co-op) The purpose of the Internship Report is offer students to describe their accomplishments and demonstrate what they learned through participation at Saudi Electronic University. The report should be submitted within two weeks after you finish your Co-op training Program. In addition, the report

mgt430 __ final report

Description College of Administration and Finance Sciences Form No 4- Internship Report Cover Page Student`s Name: Student`s ID: Trainee Department: Training Organization: Field Instructor Signature: Field Instructor Name: Course Title: MGT 430 Internship Start Date: CRN Internship End Date: Academic Year/Semester: For Instructor’s Use only Instructor’s Name: Total Training Hours

project file included about cyber forensics

Description answer should not be solved by chat gpt and no plagiarisms and make sure the answer cover all the points. word file included Restricted – ‫مقيد‬ Pg. 01 Learning Outcome(s): Describe the common processes and procedures used to conduct criminal and noncriminal investigations of activities involving evidence with digital