Your submission must be your original work. No more than a combined total of 30%

May 20, 2024

Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Part I: Incident Analysis and Response
A.  Determine why the attack on Azumer Water’s infrastructure was successful, including the specific vulnerabilities that allowed the attack to occur. Provide details from the case study to support your claims.
B.  Explain how the confidentiality, integrity, and availability of Azumer Water’s operations and PII (personally identifying information) data have been compromised, using NIST, ISO 27002, or another industry-standard framework to support two claims of compromise.
C.  Identify a federal regulation this NGO violated, providing a specific example from the case study as evidence of Azumer Water’s noncompliance.
D.  Recommend immediate steps to mitigate the impact of the incident, using specific examples from the case study to justify how these steps would mitigate the impact.
E.  Explain how having an incident response plan in place will benefit Azumer Water, using details from the case study to support your explanation.
Part II: Risk Assessment and Management
F.  Discuss two processes to increase information assurance levels within the organization and bring Azumer Water into compliance with the violated federal regulation identified in part C.
G.  Recommend technical solutions to counter the remaining effects of the attack in the case study and to prevent future attacks.
H.  Recommend an organizational structure for IT and security management, including a logical delineation of roles and adequate coverage of responsibilities, to support the efficient discovery and mitigation of future incidents.
I.  Describe your risk management approach for Azumer Water based on the likelihood, severity, and impact categorization of two risks in the case study.
J.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
K.  Demonstrate professional communication in the content and presentation of your submission.

Are you struggling with this assignment?

Our team of qualified writers will write an original paper for you. Good grades guaranteed! Complete paper delivered to straight to your email.

GET HELP WITH YOUR PAPER