Cybersecurity part 2 | Information Systems homework help

  

Write an analysis of the identified systems, networks, and data by addressing the following points in 400–500 words, with respect to Sony organization. 

● What types of critical systems, networks, and data would you expect constitute Sony’s information infrastructure? Provide a brief description of these types of assets, and where relevant, the roles that these assets play in the organization. Consider conducting further research online, beyond the scope of the provided case study, to aid your answer. 

● Which of these critical assets do you think are the most essential to the organization’s ability to accomplish its mission? Explain why. 

● Do you think that the 2014 attack against Sony primarily targeted systems, networks, data, or a combination of all three? 

Please note that your answers to the Sony case study will be assessed according to the sound reasoning you have provided for your interpretation of the organization’s critical assets. In this regard, less emphasis should be placed on the accuracy of Sony’s business details, but rather on your justification of what assets you believe are essential to the organization, and their associated vulnerabilities. 

will be graded according to the following rubric:

   

Very   poor

Poor

Satisfactory

Very   good

Exceptional

 

Adherence to brief 

Student has detailed the following: 

– The organization’s critical   systems, networks, and data

– Which of these assets are essential   to the organization achieving its mission

– The associated vulnerabilities of   the organization’s systems, networks, and data (if students are addressing   their own organization); or a justification of the critical assets targeted   in the hack (if students are addressing Sony)

Answer falls within the prescribed   word count (400–500 words). 

No submission. 

OR

Student fails to address any element   of the brief. (0)

Some key elements are not addressed.   Most information provided is irrelevant.  

OR 

Answer   does not fall within the prescribed word count (100 words over word count).   (5.5)

Student   has adhered to most of the brief. Sufficient information is provided and is   mostly relevant. (7)

Student   has adhered to almost all elements of the brief. Almost all information is   provided and relevant. (8.5)

Student   has fully adhered to the brief. All information provided is comprehensive and   relevant. (10)

 

Insight into systems, networks, and   data 

Student has demonstrated their   understanding by providing a substantial description of the roles of the   critical systems, networks, and data they have identified within their   organization or Sony.

No submission. 

OR 

Student fails to demonstrate even   basic understanding of the organization’s systems, networks, and data. (0)

Student   shows an incomplete understanding of the organization’s systems, networks,   and data. (5.5)

Student   demonstrates satisfactory understanding of the organization’s systems,   networks, and data. However, at least one aspect is either not entirely correct   or complete. (7)

Student   demonstrates a strong understanding of the roles of the organization’s   critical systems, networks, and data. Their analysis clearly illustrates   understanding and conveys a degree of insight. (8.5)

Student   demonstrates a thorough and incisive understanding of the roles of the   organization’s critical systems, networks, and data. Their analysis is   comprehensive and insightful. (10)

 

Insight into which assets (systems,   networks, or data) are essential to an organization accomplishing its mission   

Student has demonstrated their   understanding by providing a substantial description of the most essential   asset (systems, networks, or data) their organization or Sony depends on.

No submission. 

OR

Student fails to demonstrate even   basic understanding of the organization’s most essential assets. (0)

Student   shows an incomplete understanding of the organization’s essential assets.   (5.5)

Student   demonstrates satisfactory understanding of the organization’s essential   assets. However, at least one aspect is either not entirely correct or   complete. (7)

Student   demonstrates a strong understanding of the chosen organization’s essential   assets. Their analysis clearly illustrates understanding and conveys a degree   of insight. (8.5)

Student   demonstrates a thorough and incisive understanding of the chosen   organization’s essential assets. Their analysis is comprehensive and   insightful. (10)

 

For students focusing on their   organization: 

Insight into the vulnerabilities of   critical systems, networks, and data

Student has demonstrated their   understanding by accurately describing the vulnerabilities of the critical   systems, networks, and data within their organization. 

For students focusing on Sony

Insight into the critical systems,   networks, and data affected by the Sony hack

Student has demonstrated their   understanding by accurately describing the critical systems, networks, and   data that were affected by the Sony hack.

No submission.

OR

Student fails to demonstrate even   basic understanding of the vulnerabilities of the organization’s critical   systems, networks, and data. (0)

No submission.

OR

Student fails to demonstrate even   basic understanding of the critical systems, networks, and data that were   affected in the Sony hack. (0)

Student shows   an incomplete understanding of the vulnerabilities of the organization’s   critical systems, networks, and data. (5.5)

Student   shows an incomplete understanding of the critical systems, networks, and data   that were affected in the Sony hack. (5.5)

Student   demonstrates satisfactory understanding of the vulnerabilities of the   organization’s critical systems, networks, and data. However, at least one   aspect is either not entirely correct or complete. (7)

Student demonstrates   satisfactory understanding of the critical systems, networks, and data that   were affected in the Sony hack However, at least one aspect is either not   entirely correct or complete. (7)

Student   demonstrates a strong understanding of the vulnerabilities of the   organization’s critical systems, networks, and data. Their analysis clearly   illustrates understanding and conveys a degree of insight. (8.5)

Student   demonstrates a strong understanding of the critical systems, networks, and   data that were affected in the Sony hack. Their analysis clearly illustrates   understanding and conveys a degree of insight. (8.5)

Student   demonstrates a thorough and incisive understanding of the vulnerabilities of   the organization’s critical systems, networks, and data. Their analysis is   comprehensive and insightful. (10)

Student   demonstrates a thorough and incisive understanding of the critical systems,   networks, and data that were affected in the Sony hack. Their analysis is   comprehensive and insightful. (10)

 

Organization of writing

Answer is structured clearly and   logically.

No submission.

OR 

Complete lack of logical structure.   (0)

Answer   has some logical structure, but not enough to justify a passing grade. (5.5) 

Answer   is structured fairly well in terms of logic and clarity. (7)

Answer   is structured very well in terms of logic and clarity. (8.5) 

Answer   is structured exceptionally well in terms of logic and clarity. (10)

Total: 50 points 

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more