{"id":133,"date":"2024-06-11T14:15:25","date_gmt":"2024-06-11T14:15:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaronjones\/?page_id=133"},"modified":"2024-06-11T14:16:56","modified_gmt":"2024-06-11T14:16:56","slug":"cs465","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aaronjones\/cs465\/","title":{"rendered":"CS465"},"content":{"rendered":"\n<p>You will be taking on the role of Chief Information Assurance Officer (CIAO) in a small manufacturing<br>company ABC Inc. Recently ABC\u2019s internal network was compromised and administrative and financial<br>operations were curtailed for a few weeks. You have been tasked with creating a set of information assurance (IA) policies and procedures to reduce the risk of company disruption and of internal proprietary information being compromised again. Your initial deliverable will be a report about what happened, some of the apparent consequences of the breach, and policies and procedures to be put in place to reduce the likelihood of future incidents. <\/p>\n\n\n\n<p>As the incoming CIAO, you are tasked with writing a detailed report about the incident, its consequences,<br>and detailed measures to prevent a recurrence. With that in mind:<br>1. Assume that this report will be submitted to your new boss. Your continued employment depends on<br>the objectivity, and thoroughness of your investigation.<br>2. With self preservation in mind; there should be:<br>(a) A summary of what happened.<br>(b) A background section outlining ABC\u2019s commercial responsibilities, intellectual properties, strategic and corporate alliances, and a discussion of the strengths and weaknesses of the network<br>infrastructure.<br>(c) What were the consequences of what happened?<br>(d) A vulnerability assessment of the company\u2019s assets and ability to function (i.e., perform services,<br>charge for services, receive payment for services, and pay for services). Label each as to whether<br>they are critical, essential, or ancillary to the company\u2019s operation. Remember the goal of IA is the<br>assurance of services, including: \u2022 integrity, \u2022 availability, \u2022 confidentiality, and \u2022 non-repudiation.<br>(e) A threat matrix risk based based on your vulnerability assessment (see Figure 1).<br>(f) A recommended company communications plan (make sure to address both internal and external<br>communications).<br>(g) How will you ensure that it won\u2019t happen again?<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/CS465-PROJECT.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CS465-PROJECT.\"><\/object><a id=\"wp-block-file--media-192be06c-d9cb-4215-9744-3faefa7714c0\" href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/CS465-PROJECT.pdf\">CS465-PROJECT<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/CS465-PROJECT.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-192be06c-d9cb-4215-9744-3faefa7714c0\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>You will be taking on the role of Chief Information Assurance Officer (CIAO) in a small manufacturingcompany ABC Inc. Recently ABC\u2019s internal network was compromised and administrative and financialoperations were curtailed for a few weeks. You have been tasked with creating a set of information assurance (IA) policies and procedures to reduce the risk of &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/cs465\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CS465<\/span><\/a><\/p>\n","protected":false},"author":25292,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/users\/25292"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":138,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/133\/revisions\/138"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}