Develop a plan for securing information assets


Assignment: Cyber Attacks Using Phishing, Spear Phishing, And Whaling

Instructions

For this task, imagine that an international organization has hired a national agency to levy phishing, spear phishing, and whaling attacks on a local competitor. The purpose of the attacks is to gain unauthorized access to the local company's business systems at a later date. In this scenario, the nature of the event is the malicious action by the international organization. The spam email that is received and accessed by employees of the local competitor results in users being tricked into providing their logon credentials. The hackers then use the credentials to gain access to the local competitor's business systems and information. It is critical that the events of the attacks be detected quickly because the local competitor is planning a marketing action, and the international organization could use this hacked information to get to their product or service to the market sooner.

Write a paper that addresses the following:

1. Differentiate between phishing, spear phishing, and whaling attacks.

2. Delineate risk responses in terms of:

1. Risk Avoidance
2. Risk Acceptance
3. Risk Sharing/Transfer
4. Risk Mitigation

• Determine risk mitigation through the application of industry best principles and practices and information security policies.

1. Determine risk mitigation through the application of well-known commercial tools such as PhishMe and PhishGuru.

2. Develop a plan for monitoring the infrastructure for security-related events.

3. Develop a plan for securing information assets.

• Provide details on security awareness, training, and education.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Develop a plan for securing information assets
Reference No:- TGS03002037

Now Priced at $40 (50% Discount)

Recommended (95%)

Rated (4.7/5)