IT 380 Module Six Case Study Analysis

ATTN: This teacher is very anal about how the papers are written so please make sure to read the Rubric and the Word Doc i attached on How to complete Writing Assignments. Overview: This case study will help you analyze a cybersecurity scenario and identify which tenets were violated. Each skill in this paper is an essential part of
the final project and accompanying milestones in this course.
Prompt: Choose either the Home Depot security breach or Target security breach from the articles below. Use the information provided to analyze the
cybersecurity occurrence, determine which principles were violated, and recommend appropriate policies to prevent recurrence. Review the Module Six
resources to complete this assignment.
After reviewing the details surrounding these two major breaches and the information from TestOut from this module, answer the following questions.
Select either the Home Depot breach or Target breach as your exemplar.
? Which tenets of cybersecurity were violated in the breach? How were those attacks executed to bypass network defenses?
? What elements of network defense would have helped mitigate or prevent the breach?
? What elements of data defense would have helped mitigate or prevent the breach?
? What best practices would you recommend going forward to better secure the organization—both for overall defense and also to provide better
detection?
Based on the TestOut sections from this module and the additional module resource articles that you reviewed, your paper should address the following critical
elements:
? Identification of cybersecurity tenets that were violated and rationale of cause
? Analysis of data defense that would have helped mitigate or prevent this breach
? Recommendation of best practices to secure organization going forward
Rubric
Guidelines for Submission: Your paper must be submitted as a 2- to 3-page Microsoft Word document with double spacing, 12-point Times New Roman font,
and one-inch margins. All academic sources must be cited using the latest APA guidelines.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
it380_module_six_case_study_analysis_guidelines_and_rubric.pdf

example_of_how_you_should_write_your_assignments.docx

Don't use plagiarized sources. Get Your Custom Essay on
IT 380 Module Six Case Study Analysis
Just from $13/Page
Order Essay

Unformatted Attachment Preview

IT 380 Module Six Case Study Analysis Guidelines and Rubric
Overview: This case study will help you analyze a cybersecurity scenario and identify which tenets were violated. Each skill in this paper is an essential part of
the final project and accompanying milestones in this course.
Prompt: Choose either the Home Depot security breach or Target security breach from the articles below. Use the information provided to analyze the
cybersecurity occurrence, determine which principles were violated, and recommend appropriate policies to prevent recurrence. Review the Module Six
resources to complete this assignment.
After reviewing the details surrounding these two major breaches and the information from TestOut from this module, answer the following questions.
Select either the Home Depot breach or Target breach as your exemplar.
?
?
?
?
Which tenets of cybersecurity were violated in the breach? How were those attacks executed to bypass network defenses?
What elements of network defense would have helped mitigate or prevent the breach?
What elements of data defense would have helped mitigate or prevent the breach?
What best practices would you recommend going forward to better secure the organization—both for overall defense and also to provide better
detection?
Based on the TestOut sections from this module and the additional module resource articles that you reviewed, your paper should address the following critical
elements:
?
?
?
Identification of cybersecurity tenets that were violated and rationale of cause
Analysis of data defense that would have helped mitigate or prevent this breach
Recommendation of best practices to secure organization going forward
Rubric
Guidelines for Submission: Your paper must be submitted as a 2- to 3-page Microsoft Word document with double spacing, 12-point Times New Roman font,
and one-inch margins. All academic sources must be cited using the latest APA guidelines.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements
Identification of
Violated
Cybersecurity Tenets
Analysis of Data
Defense
Best Practices
Recommendation
Proper Use of
Writing, Mechanics,
and Grammar
Exemplary (100%)
Meets “Proficient” criteria and
correctly identifies which tenets
were violated, with empirical
supporting examples
Meets “Proficient” criteria and
analysis demonstrates keen
insight of data defense and
prevention methods
Proficient (90%)
Correctly identifies which tenets
were violated with supporting
examples
Needs Improvement (70%)
Identifies which tenets were
violated but supporting
examples have gaps
Not Evident (0%)
Does not identify which tenets
were violated
Analysis demonstrates accurate
knowledge of data defense and
prevention methods
Does not analyze the data
defense and prevention
methods
30
Meets “Proficient” criteria and
recommendation demonstrates
understanding of industry best
practices that would remedy the
situation appropriately
Paper is free of errors in
organization and grammar with
applicable sources cited
Recommends industry best
practices to ensure proper
resolution of scenario
Analysis demonstrates
knowledge of data defense
methods but needs additional
information to support
prevention ideas
Recommends a single best
practice to remedy situation but
recommendation has gaps in
strategic implementation
Does not recommend any
industry best practices
30
Paper contains errors of
organization and grammar but
errors are limited enough so
that entries can be understood;
cites applicable sources
Paper contains errors of
organization and grammar
making the content difficult to
understand
10
Paper is mostly free of errors of
organization and grammar;
errors are marginal and rarely
interrupt the flow; cites
applicable sources
Total
Value
30
100%
Students,
There is a grading rubric on each of your written assignments. Similar to the following:
Based on the grading rubric in each of your assignments do the following:
EXAMPLE OF HOW YOU SHOULD WRITE YOUR ASSIGNMENTS!!!
TITLE PAGE
Enter your text here: Title page with course name, your name, date.
REPORT Section
Note to Student: Take the critical element title in each rubric and make it a section in your
assignment to turn in.
Identification of Violated Cybersecurity Tenets
Enter your text here: Write paragraphs.
Analysis of Data Defense
Enter your text here: Write paragraphs.
Best Practices Recommendation
Enter your text here: Write paragraphs.
Note: You do not need to add the “Proper Use of Writing, Mechanics, and Grammar”
critical element in your paper. This is for me to grade your overall work.

Purchase answer to see full
attachment

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency

Order your essay today and save 15% with the discount code ESSAYHELP