Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Outline the importance of assessment approaches and results. Born in 2 0 0 8 , the fictitious organization Acme Group is a forward - looking

Outline the importance of assessment approaches and results.
Born in 2008, the fictitious organization Acme Group is a forward-looking startup focused on building products that are needed for the digitally connected world. The organization prides itself on providing the very best product, customer experience, and vibrant culture. While it was some college roommates who started the organization, it has grown to 368 employees located across the United States.
Due to the unique nature of Acme Group's products, it has seen tremendous demand during the pandemic, and this demand is only expected to grow. The organization has also been featured on various morning shows and online publications.
This heightened attention to the Acme Group has resulted in the organization's leadership starting to take a closer look at its cybersecurity posture. While Acme Group does not operate in a regulated industry, the leadership is interested in building a solid cybersecurity program that is based on the latest information about common attacks and provides a relatively short list of prioritized controls.
Recently, Acme Group's executive leadership brought in consultants to advise on their security program. Based on the consultants' recommendation, Acme Group hired a chief information security officer and invested in the latest defensive technologies. However, despite these significant technology investments, Acme Group has continued to experience security incidents. Some of the security incidents the organization has experienced in just the last few months include the following:
1. A phishing email containing an infected attachment installed spyware and stole employees' credentials, bank account information, and keystrokes.
2. Another phishing attack successfully deceived the assistant of the chief financial officer to wire transfer thousands of dollars to a fraudulent account.
3. A misconfiguration of the public customers' portal allowed an attacker unauthorized access to sensitive customer records.
4. A malicious actor claiming to be a support technician managed to dupe the staff and gained unauthorized access to the data center.
5. An attacker compromised a publicly exposed server by following well-known adversary tradecraft. The security team did not identify this compromise until a third-party notification came several months later.
6. Numerous other incidents have been caused due to employees installing unauthorized software, visiting social media sites, and using weak passwords.
The above incidents have put the executive leadership on edge, and they are unsure of the resilience of the current security posture and defensive capabilities.
For this assignment, review the types of security incidents listed above that Acme Groups has experienced and recommend a security assessment for each of the six incidents. Please explain the reason for your recommendation and how it will help that particular incident type and help evaluate the organization's overall security posture.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MongoDB Applied Design Patterns Practical Use Cases With The Leading NoSQL Database

Authors: Rick Copeland

1st Edition

1449340040, 978-1449340049

More Books

Students also viewed these Databases questions

Question

=+ (a) If A(An1) bA(1) for all / and if b Answered: 1 week ago

Answered: 1 week ago

Question

5. Have you stressed the topics relevance to your audience?

Answered: 1 week ago