Cyber Breach Case Research Name Institution Affiliation Executive Summary The proper functioning of information security has become the main concern for major sectors of the U.S. national and economic security. The challenges facing cybersecurity globally have weakened the complex systems that were put in place. Cybersecurity activities should be guided towards providing sustainable economic and health systems security. The United States has been on the lead in fighting cyber insecurity with both legislation and policies that aim towards minimizing acts of cyber terror. The NIST framework is aimed at using business drivers to guide cybersecurity activities and taking care of the risks that arise in the process by including them as management processes. This paper discusses cases of cybersecurity that have happened in various companies across the different industries from social media to health among others. It looks at the time the breach incidences happened their impact on the Data security Awareness training DETECT Detection process RESPOND Response planning Communications mitigation RECOVER improvements Snapchat Functions Categories IDENTIFY Risk assessment Risk management strategy PROTECT Access control Data security Protective technology DETECT Detection process Anomalies and events RESPOND Response planning Communications mitigation RECOVER Improvements Recovery planning Gamestop Functions Categories IDENTIFY Asset management Supply chain risk management Risk assessment governance PROTECT Access control Data security maintenance DETECT Detection process Anomalies and events RESPOND Response planning Communications Mitigation Analysis RECOVER Improvements communications Fling Functions Categories IDENTIFY Risk assessment Risk management strategy PROTECT Access control Data security Protective technology DETECT Detection process Security continuous monitoring RESPOND Response planning Communications Analysis Mitigation Improvements RECOVER Improvements Recovery planning University of Oklahoma Functions Categories IDENTIFY Risk assessment Governance Asset management Business environment PROTECT Access control Data security Awareness training DETECT Detection process Anomalies and events RESPOND Response planning Communications Mitigation analysis RECOVER Improvements Recovery planning communications [...]
This is a 2 person project. I will need you to complete my half. My 5 cases described in the Project.1.25.2018 template, are attached and titled "5 cases". Please read the instructions carefully in regards to her expectations. I will gather materials from our weekly readings for you to utilize for the research as she wants to know that we are reading her material and referencing accordingly. An example template of how she wants our cases broken down are in the Project Format Template (Easier Notes to Follow) document. If you need additional info, please let me know! Based on this only being my half of the work, I am assuming I will only need about 10-11 pages? Don't worry about the cover page. Please complete a reference page though if you can. APA format for the entire paper. Thanks! Please let me know if you are able to view all of the attachments.