CYBERSECURITY Research Paper – Define Cybersecurity

Locations and contact data on 515,000 vulnerable people stolen in Red Cross data breach


https://portswigger.net/daily-swig/red-cross-suffers-cyber-attack-data-of-515-000-highly-vulnerable-people-exposedREAD THROUGH DIRECTIONS ENTIRELY – I AM A TRUSTED USER OF THIS SITE. I PAY ALL MY BIDS. I TIP IF PAPER MEETS STANDARDS.

The purpose of this assignment: Identify a data breach incident from news media and provide an overview of the case; Analyze common security failures and identify specific cybersecurity principles that have been violated; Given a specific scenario, identify the cybersecurity principles involved or needed to increase the cybersecurity posture; and describe appropriate measures to be taken should a system compromise occur (Business Continuity Plan).

DESCRIPTION OF ASSIGNMENT:
Identify and conduct investigation using into a data breach incident of an organization in the past several years. : This the data breach to be used:

https://www.npr.org/2022/01/20/1074405423/red-cross-cyberattack
https://portswigger.net/daily-swig/red-cross-suffers-cyber-attack-data-of-515-000-highly-vulnerable-people-exposed
https://www.zdnet.com/article/red-cross-worried-about-misuse-of-stolen-data-by-nation-states-cybercriminals/

Locations and contact data on 515,000 vulnerable people stolen in Red Cross data breach

Then, develop a written paper that will provide the following sections:
Data Breach Overview: Provide an overview of the data breach incident you selected, the organization that it occurred in, and indicate if any prior data incidents occurred in that organization previously (Use references to support your claims).
Cybersecurity Failures: Analyze the cybersecurity failures and identify the specific dimension(s) of cybersecurity and their related principles (Hint: McCumber Cube and it’s dimensions + relevant principles on each dimension!) that have been violated during the identified data breach incident (Use references to support your claims).
Cyber Risk Management: From recent industry and/or government reports (i.e. less than three years old) and in your own words (no quotes, but use references to support your claims) identify the cyber risk management factors (Likelihood – also known as ‘rate of occurrence’ + estimated impact) associated with the specific cyber incident that occurred for the organization you’re investigating. (Use references to support your claims). Include a simple table to highlight the cyber threat, risk description, likelihood, impact, and actions proposed to mitigate that cyber threat in the future.
Business Continuity Plan: In your own words (no quotes, but use references to support your claims) describe appropriate measures that the organizations should take to mitigate the risk of another data breach incident in the future.
Conclusion: In your own words (no quotes!!!), provide a conclusion that summarizes the whole paper.
In particular, you will need to develop a 5- to 7-page document (not more!) that outlines each of the section above and provides the details to address the points above.
FORMAT:
The body of the proposal should be 5- to 7-pages long (not including title page, Table of Contents, Reference List).

The report should also be done professionally and should include:
Table of Contents (with sections & page numbers identified – Ensure the context text starts on page 1, frontmatter shouldn’t be counted in page numbers)
Page numbers on all pages
Clear and consistent headings of all sections
No running heads
Reference List following APA (At least seven different references)
Certificate of Authorship – Use the certificate provided as the last page of the document within the assignment file (not separate file)
Professional and appealing document is expected.