SlideShare a Scribd company logo
1 of 1
The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia
Questions:
1. Describe the role of Information Technology Services (ITS) in fulfilling UV's mission.
2. What attracts cyberspaces to universities?
3. What are the most common attack methods and approaches for mitigating those attacks?
4. Describe each of the five objectives of the Phoenix Project. What level of effort would be
required to accomplish these objectives?
5. Describe the various internal and external stakeholders associated with the Phoenix Project.
How would you recommend the project team communicate with each stakeholder group?
6. Identify the key risks inherent to this project. How would you recommend the team manage
these risks?
7. When and how should the success of the Phoenix Project be evaluated?

More Related Content

Similar to The Phoenix Project- Remediation of a Cybersecurity Crisis at the Univ.docx

480 Portfolio FINAL
480 Portfolio FINAL480 Portfolio FINAL
480 Portfolio FINALAmir Taha
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYIJITE
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY IJITE
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning SecurityIJITE
 
Exploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in DevelopmentExploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in DevelopmentDevelopment Innovations
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscapegreendigital
 
RiskCommunicationWorkshop--KL--Schmidt_C4CS
RiskCommunicationWorkshop--KL--Schmidt_C4CSRiskCommunicationWorkshop--KL--Schmidt_C4CS
RiskCommunicationWorkshop--KL--Schmidt_C4CSOliver S. Schmidt
 
Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...
Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...
Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...Madison Ramsay
 
An efficient control of virus propagation
An efficient control of virus propagationAn efficient control of virus propagation
An efficient control of virus propagationUltraUploader
 
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsJames Embleton-Forrest, BA, MCGI
 
Day 3 Presentation.pptx
Day 3 Presentation.pptxDay 3 Presentation.pptx
Day 3 Presentation.pptxPaulineMae5
 
Software development group 3 questions .pptx
Software development group 3 questions .pptxSoftware development group 3 questions .pptx
Software development group 3 questions .pptxHarris430768
 
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...ijcsa
 
2010 Does Social Networking Equate to Social Learning?
2010 Does Social Networking Equate to Social Learning?2010 Does Social Networking Equate to Social Learning?
2010 Does Social Networking Equate to Social Learning?WCET
 
Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Patrice Cloutier
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalJohn Dunne
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...IJITE
 
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats" Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"EC-Council
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 

Similar to The Phoenix Project- Remediation of a Cybersecurity Crisis at the Univ.docx (20)

480 Portfolio FINAL
480 Portfolio FINAL480 Portfolio FINAL
480 Portfolio FINAL
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning Security
 
Exploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in DevelopmentExploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in Development
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
204
204204
204
 
RiskCommunicationWorkshop--KL--Schmidt_C4CS
RiskCommunicationWorkshop--KL--Schmidt_C4CSRiskCommunicationWorkshop--KL--Schmidt_C4CS
RiskCommunicationWorkshop--KL--Schmidt_C4CS
 
Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...
Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...
Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...
 
An efficient control of virus propagation
An efficient control of virus propagationAn efficient control of virus propagation
An efficient control of virus propagation
 
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency WarningsOptimizing the Use of Social Media for the Dissemination of Emergency Warnings
Optimizing the Use of Social Media for the Dissemination of Emergency Warnings
 
Day 3 Presentation.pptx
Day 3 Presentation.pptxDay 3 Presentation.pptx
Day 3 Presentation.pptx
 
Software development group 3 questions .pptx
Software development group 3 questions .pptxSoftware development group 3 questions .pptx
Software development group 3 questions .pptx
 
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...
 
2010 Does Social Networking Equate to Social Learning?
2010 Does Social Networking Equate to Social Learning?2010 Does Social Networking Equate to Social Learning?
2010 Does Social Networking Equate to Social Learning?
 
Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management Digital Volunteers and Emergency Management
Digital Volunteers and Emergency Management
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 Final
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
 
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats" Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
Global CCISO Forum 2018 | John Felker "Partnerships to Address Threats"
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 

More from clarkjanyce

The percentage of Puerto Rican voters who favored statehood in the Nov.docx
The percentage of Puerto Rican voters who favored statehood in the Nov.docxThe percentage of Puerto Rican voters who favored statehood in the Nov.docx
The percentage of Puerto Rican voters who favored statehood in the Nov.docxclarkjanyce
 
Thermodynamics and Enzymes - List ond describe the vorious common dyna.docx
Thermodynamics and Enzymes - List ond describe the vorious common dyna.docxThermodynamics and Enzymes - List ond describe the vorious common dyna.docx
Thermodynamics and Enzymes - List ond describe the vorious common dyna.docxclarkjanyce
 
The number in the name of a restriction enzyme represents the order in.docx
The number in the name of a restriction enzyme represents the order in.docxThe number in the name of a restriction enzyme represents the order in.docx
The number in the name of a restriction enzyme represents the order in.docxclarkjanyce
 
There are several different methodologies for implementing an ERP syst.docx
There are several different methodologies for implementing an ERP syst.docxThere are several different methodologies for implementing an ERP syst.docx
There are several different methodologies for implementing an ERP syst.docxclarkjanyce
 
There are direct- indirect and non-financial components of compensatio.docx
There are direct- indirect and non-financial components of compensatio.docxThere are direct- indirect and non-financial components of compensatio.docx
There are direct- indirect and non-financial components of compensatio.docxclarkjanyce
 
There are roughly 2000 days from birth until a child begins Kindergart.docx
There are roughly 2000 days from birth until a child begins Kindergart.docxThere are roughly 2000 days from birth until a child begins Kindergart.docx
There are roughly 2000 days from birth until a child begins Kindergart.docxclarkjanyce
 
There are many reasons to become involved with your community- It bene.docx
There are many reasons to become involved with your community- It bene.docxThere are many reasons to become involved with your community- It bene.docx
There are many reasons to become involved with your community- It bene.docxclarkjanyce
 
There are a number of errors in the following program- All errors are.docx
There are a number of errors in the following program- All errors are.docxThere are a number of errors in the following program- All errors are.docx
There are a number of errors in the following program- All errors are.docxclarkjanyce
 
THEORY OF THE FIRM- MANAGERIAL BEHAVIOR- AGENCY COSTS AND OWNERSHIP ST.docx
THEORY OF THE FIRM- MANAGERIAL BEHAVIOR- AGENCY COSTS AND OWNERSHIP ST.docxTHEORY OF THE FIRM- MANAGERIAL BEHAVIOR- AGENCY COSTS AND OWNERSHIP ST.docx
THEORY OF THE FIRM- MANAGERIAL BEHAVIOR- AGENCY COSTS AND OWNERSHIP ST.docxclarkjanyce
 
Theory of Automata Prove above statement Prove that for any alphabet.docx
Theory of Automata Prove above statement Prove that for any alphabet.docxTheory of Automata Prove above statement Prove that for any alphabet.docx
Theory of Automata Prove above statement Prove that for any alphabet.docxclarkjanyce
 
The NIH is creating a test for the Zika virus- The incidence of a Zika.docx
The NIH is creating a test for the Zika virus- The incidence of a Zika.docxThe NIH is creating a test for the Zika virus- The incidence of a Zika.docx
The NIH is creating a test for the Zika virus- The incidence of a Zika.docxclarkjanyce
 
The National Labor Relations Board is divided into two distinct parts-.docx
The National Labor Relations Board is divided into two distinct parts-.docxThe National Labor Relations Board is divided into two distinct parts-.docx
The National Labor Relations Board is divided into two distinct parts-.docxclarkjanyce
 
The variance of the sample average is Var(Y)-n2- Why-.docx
The variance of the sample average is Var(Y)-n2- Why-.docxThe variance of the sample average is Var(Y)-n2- Why-.docx
The variance of the sample average is Var(Y)-n2- Why-.docxclarkjanyce
 
The urban population in the US grew during the industrial era- Urban g.docx
The urban population in the US grew during the industrial era- Urban g.docxThe urban population in the US grew during the industrial era- Urban g.docx
The urban population in the US grew during the industrial era- Urban g.docxclarkjanyce
 
The value at t-5 of the cash flow stream described in the table below.docx
The value at t-5 of the cash flow stream described in the table below.docxThe value at t-5 of the cash flow stream described in the table below.docx
The value at t-5 of the cash flow stream described in the table below.docxclarkjanyce
 
The U-S- is viewed as a pivotal member in the world economy since its.docx
The U-S- is viewed as a pivotal member in the world economy since its.docxThe U-S- is viewed as a pivotal member in the world economy since its.docx
The U-S- is viewed as a pivotal member in the world economy since its.docxclarkjanyce
 
The triplets are now three and a haif years oid- and Jamie Lee and Ros.docx
The triplets are now three and a haif years oid- and Jamie Lee and Ros.docxThe triplets are now three and a haif years oid- and Jamie Lee and Ros.docx
The triplets are now three and a haif years oid- and Jamie Lee and Ros.docxclarkjanyce
 
The trial balance for Lindor Corporation- a manufacturing company- for.docx
The trial balance for Lindor Corporation- a manufacturing company- for.docxThe trial balance for Lindor Corporation- a manufacturing company- for.docx
The trial balance for Lindor Corporation- a manufacturing company- for.docxclarkjanyce
 
The Town of Bedford Falls approved a General Fund operating budget for.docx
The Town of Bedford Falls approved a General Fund operating budget for.docxThe Town of Bedford Falls approved a General Fund operating budget for.docx
The Town of Bedford Falls approved a General Fund operating budget for.docxclarkjanyce
 
The most common letter is E with 147 occurences- The least common lett.docx
The most common letter is E with 147 occurences- The least common lett.docxThe most common letter is E with 147 occurences- The least common lett.docx
The most common letter is E with 147 occurences- The least common lett.docxclarkjanyce
 

More from clarkjanyce (20)

The percentage of Puerto Rican voters who favored statehood in the Nov.docx
The percentage of Puerto Rican voters who favored statehood in the Nov.docxThe percentage of Puerto Rican voters who favored statehood in the Nov.docx
The percentage of Puerto Rican voters who favored statehood in the Nov.docx
 
Thermodynamics and Enzymes - List ond describe the vorious common dyna.docx
Thermodynamics and Enzymes - List ond describe the vorious common dyna.docxThermodynamics and Enzymes - List ond describe the vorious common dyna.docx
Thermodynamics and Enzymes - List ond describe the vorious common dyna.docx
 
The number in the name of a restriction enzyme represents the order in.docx
The number in the name of a restriction enzyme represents the order in.docxThe number in the name of a restriction enzyme represents the order in.docx
The number in the name of a restriction enzyme represents the order in.docx
 
There are several different methodologies for implementing an ERP syst.docx
There are several different methodologies for implementing an ERP syst.docxThere are several different methodologies for implementing an ERP syst.docx
There are several different methodologies for implementing an ERP syst.docx
 
There are direct- indirect and non-financial components of compensatio.docx
There are direct- indirect and non-financial components of compensatio.docxThere are direct- indirect and non-financial components of compensatio.docx
There are direct- indirect and non-financial components of compensatio.docx
 
There are roughly 2000 days from birth until a child begins Kindergart.docx
There are roughly 2000 days from birth until a child begins Kindergart.docxThere are roughly 2000 days from birth until a child begins Kindergart.docx
There are roughly 2000 days from birth until a child begins Kindergart.docx
 
There are many reasons to become involved with your community- It bene.docx
There are many reasons to become involved with your community- It bene.docxThere are many reasons to become involved with your community- It bene.docx
There are many reasons to become involved with your community- It bene.docx
 
There are a number of errors in the following program- All errors are.docx
There are a number of errors in the following program- All errors are.docxThere are a number of errors in the following program- All errors are.docx
There are a number of errors in the following program- All errors are.docx
 
THEORY OF THE FIRM- MANAGERIAL BEHAVIOR- AGENCY COSTS AND OWNERSHIP ST.docx
THEORY OF THE FIRM- MANAGERIAL BEHAVIOR- AGENCY COSTS AND OWNERSHIP ST.docxTHEORY OF THE FIRM- MANAGERIAL BEHAVIOR- AGENCY COSTS AND OWNERSHIP ST.docx
THEORY OF THE FIRM- MANAGERIAL BEHAVIOR- AGENCY COSTS AND OWNERSHIP ST.docx
 
Theory of Automata Prove above statement Prove that for any alphabet.docx
Theory of Automata Prove above statement Prove that for any alphabet.docxTheory of Automata Prove above statement Prove that for any alphabet.docx
Theory of Automata Prove above statement Prove that for any alphabet.docx
 
The NIH is creating a test for the Zika virus- The incidence of a Zika.docx
The NIH is creating a test for the Zika virus- The incidence of a Zika.docxThe NIH is creating a test for the Zika virus- The incidence of a Zika.docx
The NIH is creating a test for the Zika virus- The incidence of a Zika.docx
 
The National Labor Relations Board is divided into two distinct parts-.docx
The National Labor Relations Board is divided into two distinct parts-.docxThe National Labor Relations Board is divided into two distinct parts-.docx
The National Labor Relations Board is divided into two distinct parts-.docx
 
The variance of the sample average is Var(Y)-n2- Why-.docx
The variance of the sample average is Var(Y)-n2- Why-.docxThe variance of the sample average is Var(Y)-n2- Why-.docx
The variance of the sample average is Var(Y)-n2- Why-.docx
 
The urban population in the US grew during the industrial era- Urban g.docx
The urban population in the US grew during the industrial era- Urban g.docxThe urban population in the US grew during the industrial era- Urban g.docx
The urban population in the US grew during the industrial era- Urban g.docx
 
The value at t-5 of the cash flow stream described in the table below.docx
The value at t-5 of the cash flow stream described in the table below.docxThe value at t-5 of the cash flow stream described in the table below.docx
The value at t-5 of the cash flow stream described in the table below.docx
 
The U-S- is viewed as a pivotal member in the world economy since its.docx
The U-S- is viewed as a pivotal member in the world economy since its.docxThe U-S- is viewed as a pivotal member in the world economy since its.docx
The U-S- is viewed as a pivotal member in the world economy since its.docx
 
The triplets are now three and a haif years oid- and Jamie Lee and Ros.docx
The triplets are now three and a haif years oid- and Jamie Lee and Ros.docxThe triplets are now three and a haif years oid- and Jamie Lee and Ros.docx
The triplets are now three and a haif years oid- and Jamie Lee and Ros.docx
 
The trial balance for Lindor Corporation- a manufacturing company- for.docx
The trial balance for Lindor Corporation- a manufacturing company- for.docxThe trial balance for Lindor Corporation- a manufacturing company- for.docx
The trial balance for Lindor Corporation- a manufacturing company- for.docx
 
The Town of Bedford Falls approved a General Fund operating budget for.docx
The Town of Bedford Falls approved a General Fund operating budget for.docxThe Town of Bedford Falls approved a General Fund operating budget for.docx
The Town of Bedford Falls approved a General Fund operating budget for.docx
 
The most common letter is E with 147 occurences- The least common lett.docx
The most common letter is E with 147 occurences- The least common lett.docxThe most common letter is E with 147 occurences- The least common lett.docx
The most common letter is E with 147 occurences- The least common lett.docx
 

Recently uploaded

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

The Phoenix Project- Remediation of a Cybersecurity Crisis at the Univ.docx

  • 1. The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia Questions: 1. Describe the role of Information Technology Services (ITS) in fulfilling UV's mission. 2. What attracts cyberspaces to universities? 3. What are the most common attack methods and approaches for mitigating those attacks? 4. Describe each of the five objectives of the Phoenix Project. What level of effort would be required to accomplish these objectives? 5. Describe the various internal and external stakeholders associated with the Phoenix Project. How would you recommend the project team communicate with each stakeholder group? 6. Identify the key risks inherent to this project. How would you recommend the team manage these risks? 7. When and how should the success of the Phoenix Project be evaluated?