SlideShare a Scribd company logo
<insert narration>
<Title>
CMIT 421 <Section #>
<Student Name>
July 6, 2020
Good morning. My name is <Student Name>.
I work in the MERCURY USA Information Security and
Technology Department as a cyber threat analyst.
Today, I’ll be presenting our proposal to address the CEO’s
mandate to protect the organization from dangerous ransomware
attacks.
Let’s get started.
1
<insert narration>
AGENDA
2
Logistics through innovation, dedication, and technology –
MERCURY USA Delivers!
Tell your audience what you intend to cover in your proposal.
This is the PURPOSE of your communication!
You should cover the three areas enumerated in the Project 3
instructions.
Ensure you link your main points to your earlier work in Project
#1 and Project #2.
Although three main points is considered ideal, use less or more
to fit your project; four main points are shown here for example
purposes only.
The three projects should be consistent and aligned with Judy
“Mac” McNamara’s guidance.
2
Main Point #1
Main Point #2
Main Point #3
Main Point #4
1: OUR BUSINESS CASE
3
Logistics through innovation, dedication, and technology –
MERCURY USA Delivers!
<insert narration>
What are the important factors about the business?
What is the CEO’s intent and guidance?
How do the first two items relate to the next slides?
Example sub-bullet #1
Example sub-bullet #2
Example sub-bullet #3
This is main point #1. Provide no more than six bullets to
expand on your topic.
Limit each bullet to around six words.
This is known as the 6 x 6 rule of presenting.
On this slide, you should cover the business case. Think of this
as the value to the business that will result from your
recommendations.
How does your recommendation meet the CEO’s direction and
intent?
Tell your audience members the what, why, how, and who so
that they can make an informed decision about your proposal.
If you do not cover these areas adequately, you may not get a
decision, you may get a negative decision, or you may be told to
come back after you’ve done your due diligence.
3
2: OUR SECURITY POSTURE
4
Logistics through innovation, dedication, and technology –
MERCURY USA Delivers!
<insert narration>
What are the most important vulnerabilities discovered?
What is our exposure to known threats?
How did you link the results to the business?
Transportation industry hit hard by ransomware attacks
Example #1: Use your findings and conduct research [1]
Example #2: Use your findings and conduct research
This is main point #2. Provide no more than six bullets to
expand on your topic.
Limit each bullet to around six words.
This is known as the 6 x 6 rule of presenting.
What vulnerabilities did you find in your analysis? What are the
most important to tell the CEO about? Why are the
vulnerabilities you selected important to the business? Ensure
you explain in plain language, not technical jargon or cyber -
speak.
What are the threats that you see to the business given the
scenario?
Now consider this simple equation from the uCertify content:
risk = threat x vulnerability x impact
Use the equation to effectively explain your findings.
If you find yourself struggling to quantify a vulnerability,
return to this equation.
Are there identified and specific threats to MERCURY USA?
Avoid generic threats and using fear as a motivator.
Is there a vulnerability from your analysis that can be linked to
the specific threat?
What is the potential impact in not addressing the threat (e.g.,
cost, reputational, loss of jobs, damage to hardware and
software, etc.).
4
James Brocker (JB) - [@Andrew Rider] [@Jessica McCarty]
Not sure I understand the first bullet point. Looks like
something is missing.
James Brocker (JB) - [@John Galliano] Can you review?
John Galliano (JG) - Sorry for that, Team. Looks like a stray-
click & delete. Fixed!
3: OUR VM PROCESS
5
Logistics through innovation, dedication, and technology –
MERCURY USA Delivers!
<insert narration>
<example process graphic>
This is main point #3. Provide no more than six bullets to
expand on your topic.
Limit each bullet to around six words.
This is known as the 6 x 6 rule of presenting.
This slide includes an example graphic.
5
A
B
C
D
E
F
4A: WE NEED A GOOD SCANNER
6
Logistics through innovation, dedication, and technology –
MERCURY USA Delivers!
<insert narration>
Reviewed scanners
<Product Name> is recommended due to several factors
Sub-bullet #1
Sub-bullet #2
Sub-bullet #3
Sub-bullet #4
This is main point #4. Provide no more than six bullets to
expand on your topic.
Limit each bullet to around six words.
This is known as the 6 x 6 rule of presenting.
Provide your logic in recommending a scanning tool.
What process did you use to evaluate the scanning tools?
What tool are you recommending? Provide at least three sub-
bullets to support your recommendation.
6
4B: THE ASK
7
Logistics through innovation, dedication, and technology –
MERCURY USA Delivers!
<insert narration>
Lead-in bullet
Sub-bullet #1
Purchase <Product Name>:
Cost
Manpower
Measures of success
This is main point #4 continued. Provide no more than six
bullets to expand on your topic.
Limit each bullet to around six words.
This is known as the 6 x 6 rule of presenting.
Now give the specifics of your ask to the executive decision
maker.
What are you asking for? How much will it cost? Who will
implement it, and will additional manpower be required?
What about training? How will you measure success?
7
SUMMARY
8
Logistics through innovation, dedication, and technology –
MERCURY USA Delivers!
<insert narration>
Main Point 1
Main Point 2
Main Point 3
Main Point 4
This is your summary and your last opportunity to connect with
your audience.
Do not merely repeat your agenda topics. Add one to two
important details about each main point to review for your
audience.
Ensure you re-state why you are giving this pitch: What is the
decision you want?
What is/are the main takeaway(s)?
8
EXECUTIVE DISCUSSION & QUESTIONS
The obligatory questions slide. In this scenario, it is highly
likely for open discussion to occur among the executives
present and other stakeholders, and you will field questions.
A narration for this slide is not required.
9
<Example IEEE Reference Citations>
[1] A. Greenberg, "The Untold Story of NotPetya, the Most
Devastating Cyberattack in History", Wired, 2020. [Online].
Available: https://www.wired.com/story/notpetya-cyberattack-
ukraine-russia-code-crashed-the-world/. [Accessed: 19- May-
2020].
[2] “Nessus Pro”, Tenable.com, 2020. [Online]. Available:
https://www.tenable.com/products/nessus. [Accessed: 19- May-
2020].
REFERENCES
10
The example above uses IEEE style. Ask your instructor for
clarification on the style to be used.
A narration for this slide is not required.
10
5
MEMO
DATE: 11/ 07/2021
TO: MERCURY USA CEO.
CC: MERCURY USA SUPERVISOR.
FROM, CMIT 421
RE: CYBERSECURITY CONCERNS IN THE
TRANSPORTATION SECTOR
PRIORITY: (URGENT)
Overview
The key aim regarding this report which was requested is to
assist in the addressing of the recent concerns regarding
cybersecurity against the identified transportation sector. After
effectively viewing the identified pen testing engagement
outcomes that were sent to me, I would like to effectively
suggest that the identified transportation sector in the company
ought to effectively adopt the identified vulnerability
management which is key as a cybersecurity principle.
Vulnerability management entails the practice associated with
making sure that the given business network is effectively
protected against any probable security weaknesses that can
lead to hacker attacks.
The identified vulnerability management usually works
collaboratively with the identified Open Vulnerability
Assessment Scanners tool which helps in the reduction of the
strain regarding the security personnel and even the operation
sectors within the identified transportation segment (Zakareya,
2018). The company may suffer the issue of ransomware if they
fail to effectively implement the identified vulnerability
management process which could impact the Mercury USA
financially.
Part 1: Vulnerability Management (VM) Process
Recommendation
When taking part in the implementation of the vulnerability
Process, the company needs to consider the identified
recognition regarding vulnerabilities as well as the investigation
associated with the essential vulnerabilities. It is vital that the
organization adopts the internal scans which is regarded as
being the kind of vulnerability management which can help in
the identification of the loopholes in the given transportation
sector which may be associated with damaging the network
associated with the company. It is also vital to consider the
measure regarding effectiveness associated with the internal
scans to make sure that it is the most appropriate strategy that is
available (Easttom, 2020).
Part 2: Vulnerability Scanning Tool Evaluation and
Recommendations
The identified OpenVas scanning tool is considered to be an
open source vulnerability scanning tool which in my personal
opinion is considered to be an industry standard. The key
benefit for the use of the OpenVas scanning tool is the
transparency aspect and it usually does not raise any security
associated concerns. It is associated with patching any kind of
security issues which may arise since it is easy to locate the
bugs but it is also vulnerable to hacking (Easttom, 2020). To
ensure feasibility in its use, I would recommend that the
identified Mercury USA is involved in the adoption of the
OpenVAS scanning instrument because of the capability it has
to offer a comprehensive report.
Part 3: Business Case Example
In the situation whereby the company does not take part in the
implementation of the given recommendation, there is the risk
of ransomware. For the given device to effectively function
again, the identified malicious program is associated with
infecting the identified protection systems as well as is involved
in showing messages requesting for a fee as the charges. It is
vital to note that ransomware can also create an essential
disruption regarding normal operations at the Identified
Mercury USA and in some cases data loss. Ransomware is
usually known to be involved in the damage of the companies’
reputation and it is vital for the mercury USA recommendations
to be followed to avoid such cases (Foreman, 2019).
Conclusion
Through the adoption of the internal scans as a key
vulnerability management kind of process to help in
safeguarding the identified transportation sector, the given
company can effectively solve most of the cybersecurity breach
situations and prevent any kind of losses. Collaboratively with
the identified OpenVAS scanning tool, the internal scans can
assist the organizations in safeguarding of the essential
information and in the reduction of the risk regarding
vulnerabilities like the malware infections (Zakareya, 2018).
Eqbal Danish
Cybersecurity Threat Analyst
Mercury USA
References
Foreman, P. (2019). The vulnerability experience. Vulnerability
Management, 7-34.
doi:10.1201/9780429289651-2
Easttom, C. (2020). Vulnerability assessment and
management. The NICE Cyber Security
Framework, 241-258. doi:10.1007/978-3-030-41987-5_12
Zakareya, O. (2018). Vulnerability and forensics associated
with the smart grid: Cyber attacks. International Journal of
Computer Applications, 181(22), 32-38.
doi:10.5120/ijca2018917952
Project Work for Week 6: Begin the Presentation to
Management
Using your two previous deliverables and
the Nessus scan report from Project 2, create a five- to 10-slide
presentation that will persuade management to implement a VM
process and purchase the commercial vulnerability
scanner Nessus as a key component of that VM process.
You will provide voice annotation for all slides in the following
format:
· five to 10 slides maximum; limit bullets to no more
than six per slide
· voice annotation for every slide (excluding the reference slide)
· a reference slide with one to two quality sources
Use the Presentation to Management Template. In the template,
you will see specific instructions in the document. Delete the
instruction text before you submit your project.
insert narrationTitleCMIT 421 Section #Student Na

More Related Content

Similar to insert narrationTitleCMIT 421 Section #Student Na

MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docxMITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
helzerpatrina
 
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docxMITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
roushhsiu
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
alanfhall8953
 
Mi0040 technology management
Mi0040  technology managementMi0040  technology management
Mi0040 technology management
smumbahelp
 
Mi0040 technology management
Mi0040  technology managementMi0040  technology management
Mi0040 technology management
smumbahelp
 
Mi0040 technology management
Mi0040  technology managementMi0040  technology management
Mi0040 technology management
smumbahelp
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
IJNSA Journal
 
Quality myths
Quality mythsQuality myths
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docx
juliennehar
 
Mi0039 e-commerce
Mi0039  e-commerceMi0039  e-commerce
Mi0039 e-commerce
smumbahelp
 
Strategy formulation
Strategy formulationStrategy formulation
Strategy formulation
Jeannifer Villanueva
 
Web Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingWeb Application Penetration Tests - Reporting
Web Application Penetration Tests - Reporting
Netsparker
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
Chandan Singh Ghodela
 
Smu mba sem 3 pm spring 2016 assignments
Smu mba sem 3 pm spring 2016 assignmentsSmu mba sem 3 pm spring 2016 assignments
Smu mba sem 3 pm spring 2016 assignments
solved_assignments
 
Annamalai mba 2020 21 assignments
Annamalai mba 2020 21 assignmentsAnnamalai mba 2020 21 assignments
Annamalai mba 2020 21 assignments
PRADEEP SHARMA
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
Selling Infosec to the CSuite
Selling Infosec to the CSuiteSelling Infosec to the CSuite
Selling Infosec to the CSuite
Dave R. Taylor
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
accenture
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
Chris Ross
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
IJNSA Journal
 

Similar to insert narrationTitleCMIT 421 Section #Student Na (20)

MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docxMITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
 
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docxMITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
MITS5004 Assignment 3 2 Copyright © 2015-2018 VIT, All Rig.docx
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
 
Mi0040 technology management
Mi0040  technology managementMi0040  technology management
Mi0040 technology management
 
Mi0040 technology management
Mi0040  technology managementMi0040  technology management
Mi0040 technology management
 
Mi0040 technology management
Mi0040  technology managementMi0040  technology management
Mi0040 technology management
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Quality myths
Quality mythsQuality myths
Quality myths
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docx
 
Mi0039 e-commerce
Mi0039  e-commerceMi0039  e-commerce
Mi0039 e-commerce
 
Strategy formulation
Strategy formulationStrategy formulation
Strategy formulation
 
Web Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingWeb Application Penetration Tests - Reporting
Web Application Penetration Tests - Reporting
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
 
Smu mba sem 3 pm spring 2016 assignments
Smu mba sem 3 pm spring 2016 assignmentsSmu mba sem 3 pm spring 2016 assignments
Smu mba sem 3 pm spring 2016 assignments
 
Annamalai mba 2020 21 assignments
Annamalai mba 2020 21 assignmentsAnnamalai mba 2020 21 assignments
Annamalai mba 2020 21 assignments
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Selling Infosec to the CSuite
Selling Infosec to the CSuiteSelling Infosec to the CSuite
Selling Infosec to the CSuite
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 

More from TatianaMajor22

Please readRobert Geraci, Russia Minorities and Empire,” in .docx
Please readRobert Geraci, Russia Minorities and Empire,” in .docxPlease readRobert Geraci, Russia Minorities and Empire,” in .docx
Please readRobert Geraci, Russia Minorities and Empire,” in .docx
TatianaMajor22
 
Ford VS ChevroletThere are many reasons that make the Chevy.docx
Ford VS ChevroletThere are many reasons that make the Chevy.docxFord VS ChevroletThere are many reasons that make the Chevy.docx
Ford VS ChevroletThere are many reasons that make the Chevy.docx
TatianaMajor22
 
Fairness and Discipline     Weve all been disciplined at one.docx
Fairness and Discipline     Weve all been disciplined at one.docxFairness and Discipline     Weve all been disciplined at one.docx
Fairness and Discipline     Weve all been disciplined at one.docx
TatianaMajor22
 
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docxAppendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
TatianaMajor22
 
Effects of StressProvide a 1-page description of a stressful .docx
Effects of StressProvide a 1-page description of a stressful .docxEffects of StressProvide a 1-page description of a stressful .docx
Effects of StressProvide a 1-page description of a stressful .docx
TatianaMajor22
 
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docxDesign Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
TatianaMajor22
 
Question 12.5 pointsSaveThe OSU studies concluded that le.docx
Question 12.5 pointsSaveThe OSU studies concluded that le.docxQuestion 12.5 pointsSaveThe OSU studies concluded that le.docx
Question 12.5 pointsSaveThe OSU studies concluded that le.docx
TatianaMajor22
 
Case Study 1 Questions1.     What is the allocated budget .docx
Case Study 1 Questions1.     What is the allocated budget  .docxCase Study 1 Questions1.     What is the allocated budget  .docx
Case Study 1 Questions1.     What is the allocated budget .docx
TatianaMajor22
 
Behavior in OrganizationsIntercultural Communications Exercise .docx
Behavior in OrganizationsIntercultural Communications Exercise .docxBehavior in OrganizationsIntercultural Communications Exercise .docx
Behavior in OrganizationsIntercultural Communications Exercise .docx
TatianaMajor22
 
Discussion Question Comparison of Theories on Anxiety Disord.docx
Discussion Question Comparison of Theories on Anxiety Disord.docxDiscussion Question Comparison of Theories on Anxiety Disord.docx
Discussion Question Comparison of Theories on Anxiety Disord.docx
TatianaMajor22
 
I have always liked Dustin Hoffmans style of acting, in this mov.docx
I have always liked Dustin Hoffmans style of acting, in this mov.docxI have always liked Dustin Hoffmans style of acting, in this mov.docx
I have always liked Dustin Hoffmans style of acting, in this mov.docx
TatianaMajor22
 
Is obedience to the law sufficient to ensure ethical behavior Wh.docx
Is obedience to the law sufficient to ensure ethical behavior Wh.docxIs obedience to the law sufficient to ensure ethical behavior Wh.docx
Is obedience to the law sufficient to ensure ethical behavior Wh.docx
TatianaMajor22
 
If you are using the Blackboard Mobile Learn IOS App, please clic.docx
If you are using the Blackboard Mobile Learn IOS App, please clic.docxIf you are using the Blackboard Mobile Learn IOS App, please clic.docx
If you are using the Blackboard Mobile Learn IOS App, please clic.docx
TatianaMajor22
 
Is the proliferation of social media and communication devices a .docx
Is the proliferation of social media and communication devices a .docxIs the proliferation of social media and communication devices a .docx
Is the proliferation of social media and communication devices a .docx
TatianaMajor22
 
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docxMATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
TatianaMajor22
 
If the CIO is to be valued as a strategic actor, how can he bring.docx
If the CIO is to be valued as a strategic actor, how can he bring.docxIf the CIO is to be valued as a strategic actor, how can he bring.docx
If the CIO is to be valued as a strategic actor, how can he bring.docx
TatianaMajor22
 
I am showing below the proof of breakeven, which is fixed costs .docx
I am showing below the proof of breakeven, which is fixed costs .docxI am showing below the proof of breakeven, which is fixed costs .docx
I am showing below the proof of breakeven, which is fixed costs .docx
TatianaMajor22
 
Examine the way in which death and dying are viewed at different .docx
Examine the way in which death and dying are viewed at different .docxExamine the way in which death and dying are viewed at different .docx
Examine the way in which death and dying are viewed at different .docx
TatianaMajor22
 
Karimi 1 Big Picture Blog Post ​ First Draft College .docx
Karimi 1 Big Picture Blog Post ​ First Draft College .docxKarimi 1 Big Picture Blog Post ​ First Draft College .docx
Karimi 1 Big Picture Blog Post ​ First Draft College .docx
TatianaMajor22
 
Please try not to use hard words Thank youWeek 3Individual.docx
Please try not to use hard words Thank youWeek 3Individual.docxPlease try not to use hard words Thank youWeek 3Individual.docx
Please try not to use hard words Thank youWeek 3Individual.docx
TatianaMajor22
 

More from TatianaMajor22 (20)

Please readRobert Geraci, Russia Minorities and Empire,” in .docx
Please readRobert Geraci, Russia Minorities and Empire,” in .docxPlease readRobert Geraci, Russia Minorities and Empire,” in .docx
Please readRobert Geraci, Russia Minorities and Empire,” in .docx
 
Ford VS ChevroletThere are many reasons that make the Chevy.docx
Ford VS ChevroletThere are many reasons that make the Chevy.docxFord VS ChevroletThere are many reasons that make the Chevy.docx
Ford VS ChevroletThere are many reasons that make the Chevy.docx
 
Fairness and Discipline     Weve all been disciplined at one.docx
Fairness and Discipline     Weve all been disciplined at one.docxFairness and Discipline     Weve all been disciplined at one.docx
Fairness and Discipline     Weve all been disciplined at one.docx
 
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docxAppendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docx
 
Effects of StressProvide a 1-page description of a stressful .docx
Effects of StressProvide a 1-page description of a stressful .docxEffects of StressProvide a 1-page description of a stressful .docx
Effects of StressProvide a 1-page description of a stressful .docx
 
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docxDesign Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docx
 
Question 12.5 pointsSaveThe OSU studies concluded that le.docx
Question 12.5 pointsSaveThe OSU studies concluded that le.docxQuestion 12.5 pointsSaveThe OSU studies concluded that le.docx
Question 12.5 pointsSaveThe OSU studies concluded that le.docx
 
Case Study 1 Questions1.     What is the allocated budget .docx
Case Study 1 Questions1.     What is the allocated budget  .docxCase Study 1 Questions1.     What is the allocated budget  .docx
Case Study 1 Questions1.     What is the allocated budget .docx
 
Behavior in OrganizationsIntercultural Communications Exercise .docx
Behavior in OrganizationsIntercultural Communications Exercise .docxBehavior in OrganizationsIntercultural Communications Exercise .docx
Behavior in OrganizationsIntercultural Communications Exercise .docx
 
Discussion Question Comparison of Theories on Anxiety Disord.docx
Discussion Question Comparison of Theories on Anxiety Disord.docxDiscussion Question Comparison of Theories on Anxiety Disord.docx
Discussion Question Comparison of Theories on Anxiety Disord.docx
 
I have always liked Dustin Hoffmans style of acting, in this mov.docx
I have always liked Dustin Hoffmans style of acting, in this mov.docxI have always liked Dustin Hoffmans style of acting, in this mov.docx
I have always liked Dustin Hoffmans style of acting, in this mov.docx
 
Is obedience to the law sufficient to ensure ethical behavior Wh.docx
Is obedience to the law sufficient to ensure ethical behavior Wh.docxIs obedience to the law sufficient to ensure ethical behavior Wh.docx
Is obedience to the law sufficient to ensure ethical behavior Wh.docx
 
If you are using the Blackboard Mobile Learn IOS App, please clic.docx
If you are using the Blackboard Mobile Learn IOS App, please clic.docxIf you are using the Blackboard Mobile Learn IOS App, please clic.docx
If you are using the Blackboard Mobile Learn IOS App, please clic.docx
 
Is the proliferation of social media and communication devices a .docx
Is the proliferation of social media and communication devices a .docxIs the proliferation of social media and communication devices a .docx
Is the proliferation of social media and communication devices a .docx
 
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docxMATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docx
 
If the CIO is to be valued as a strategic actor, how can he bring.docx
If the CIO is to be valued as a strategic actor, how can he bring.docxIf the CIO is to be valued as a strategic actor, how can he bring.docx
If the CIO is to be valued as a strategic actor, how can he bring.docx
 
I am showing below the proof of breakeven, which is fixed costs .docx
I am showing below the proof of breakeven, which is fixed costs .docxI am showing below the proof of breakeven, which is fixed costs .docx
I am showing below the proof of breakeven, which is fixed costs .docx
 
Examine the way in which death and dying are viewed at different .docx
Examine the way in which death and dying are viewed at different .docxExamine the way in which death and dying are viewed at different .docx
Examine the way in which death and dying are viewed at different .docx
 
Karimi 1 Big Picture Blog Post ​ First Draft College .docx
Karimi 1 Big Picture Blog Post ​ First Draft College .docxKarimi 1 Big Picture Blog Post ​ First Draft College .docx
Karimi 1 Big Picture Blog Post ​ First Draft College .docx
 
Please try not to use hard words Thank youWeek 3Individual.docx
Please try not to use hard words Thank youWeek 3Individual.docxPlease try not to use hard words Thank youWeek 3Individual.docx
Please try not to use hard words Thank youWeek 3Individual.docx
 

Recently uploaded

How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 

Recently uploaded (20)

How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 

insert narrationTitleCMIT 421 Section #Student Na

  • 1. <insert narration> <Title> CMIT 421 <Section #> <Student Name> July 6, 2020 Good morning. My name is <Student Name>. I work in the MERCURY USA Information Security and Technology Department as a cyber threat analyst. Today, I’ll be presenting our proposal to address the CEO’s mandate to protect the organization from dangerous ransomware attacks. Let’s get started. 1 <insert narration> AGENDA 2 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! Tell your audience what you intend to cover in your proposal. This is the PURPOSE of your communication! You should cover the three areas enumerated in the Project 3
  • 2. instructions. Ensure you link your main points to your earlier work in Project #1 and Project #2. Although three main points is considered ideal, use less or more to fit your project; four main points are shown here for example purposes only. The three projects should be consistent and aligned with Judy “Mac” McNamara’s guidance. 2 Main Point #1 Main Point #2 Main Point #3 Main Point #4 1: OUR BUSINESS CASE 3 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! <insert narration> What are the important factors about the business?
  • 3. What is the CEO’s intent and guidance? How do the first two items relate to the next slides? Example sub-bullet #1 Example sub-bullet #2 Example sub-bullet #3 This is main point #1. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. On this slide, you should cover the business case. Think of this as the value to the business that will result from your recommendations. How does your recommendation meet the CEO’s direction and intent? Tell your audience members the what, why, how, and who so that they can make an informed decision about your proposal. If you do not cover these areas adequately, you may not get a decision, you may get a negative decision, or you may be told to come back after you’ve done your due diligence. 3 2: OUR SECURITY POSTURE 4 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! <insert narration> What are the most important vulnerabilities discovered? What is our exposure to known threats? How did you link the results to the business? Transportation industry hit hard by ransomware attacks Example #1: Use your findings and conduct research [1]
  • 4. Example #2: Use your findings and conduct research This is main point #2. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. What vulnerabilities did you find in your analysis? What are the most important to tell the CEO about? Why are the vulnerabilities you selected important to the business? Ensure you explain in plain language, not technical jargon or cyber - speak. What are the threats that you see to the business given the scenario? Now consider this simple equation from the uCertify content: risk = threat x vulnerability x impact Use the equation to effectively explain your findings. If you find yourself struggling to quantify a vulnerability, return to this equation. Are there identified and specific threats to MERCURY USA? Avoid generic threats and using fear as a motivator. Is there a vulnerability from your analysis that can be linked to the specific threat? What is the potential impact in not addressing the threat (e.g., cost, reputational, loss of jobs, damage to hardware and software, etc.). 4 James Brocker (JB) - [@Andrew Rider] [@Jessica McCarty] Not sure I understand the first bullet point. Looks like something is missing. James Brocker (JB) - [@John Galliano] Can you review?
  • 5. John Galliano (JG) - Sorry for that, Team. Looks like a stray- click & delete. Fixed! 3: OUR VM PROCESS 5 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! <insert narration> <example process graphic> This is main point #3. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. This slide includes an example graphic. 5 A B C D E
  • 6. F 4A: WE NEED A GOOD SCANNER 6 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! <insert narration> Reviewed scanners <Product Name> is recommended due to several factors Sub-bullet #1 Sub-bullet #2 Sub-bullet #3 Sub-bullet #4 This is main point #4. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. Provide your logic in recommending a scanning tool. What process did you use to evaluate the scanning tools? What tool are you recommending? Provide at least three sub-
  • 7. bullets to support your recommendation. 6 4B: THE ASK 7 Logistics through innovation, dedication, and technology – MERCURY USA Delivers! <insert narration> Lead-in bullet Sub-bullet #1 Purchase <Product Name>: Cost Manpower Measures of success This is main point #4 continued. Provide no more than six bullets to expand on your topic. Limit each bullet to around six words. This is known as the 6 x 6 rule of presenting. Now give the specifics of your ask to the executive decision maker. What are you asking for? How much will it cost? Who will implement it, and will additional manpower be required? What about training? How will you measure success? 7 SUMMARY 8
  • 8. Logistics through innovation, dedication, and technology – MERCURY USA Delivers! <insert narration> Main Point 1 Main Point 2 Main Point 3 Main Point 4 This is your summary and your last opportunity to connect with your audience. Do not merely repeat your agenda topics. Add one to two important details about each main point to review for your audience. Ensure you re-state why you are giving this pitch: What is the decision you want? What is/are the main takeaway(s)? 8 EXECUTIVE DISCUSSION & QUESTIONS The obligatory questions slide. In this scenario, it is highly likely for open discussion to occur among the executives present and other stakeholders, and you will field questions. A narration for this slide is not required. 9
  • 9. <Example IEEE Reference Citations> [1] A. Greenberg, "The Untold Story of NotPetya, the Most Devastating Cyberattack in History", Wired, 2020. [Online]. Available: https://www.wired.com/story/notpetya-cyberattack- ukraine-russia-code-crashed-the-world/. [Accessed: 19- May- 2020]. [2] “Nessus Pro”, Tenable.com, 2020. [Online]. Available: https://www.tenable.com/products/nessus. [Accessed: 19- May- 2020]. REFERENCES 10 The example above uses IEEE style. Ask your instructor for clarification on the style to be used. A narration for this slide is not required. 10 5 MEMO DATE: 11/ 07/2021 TO: MERCURY USA CEO. CC: MERCURY USA SUPERVISOR. FROM, CMIT 421 RE: CYBERSECURITY CONCERNS IN THE TRANSPORTATION SECTOR PRIORITY: (URGENT)
  • 10. Overview The key aim regarding this report which was requested is to assist in the addressing of the recent concerns regarding cybersecurity against the identified transportation sector. After effectively viewing the identified pen testing engagement outcomes that were sent to me, I would like to effectively suggest that the identified transportation sector in the company ought to effectively adopt the identified vulnerability management which is key as a cybersecurity principle. Vulnerability management entails the practice associated with making sure that the given business network is effectively protected against any probable security weaknesses that can lead to hacker attacks. The identified vulnerability management usually works collaboratively with the identified Open Vulnerability Assessment Scanners tool which helps in the reduction of the strain regarding the security personnel and even the operation sectors within the identified transportation segment (Zakareya, 2018). The company may suffer the issue of ransomware if they fail to effectively implement the identified vulnerability management process which could impact the Mercury USA financially. Part 1: Vulnerability Management (VM) Process Recommendation When taking part in the implementation of the vulnerability Process, the company needs to consider the identified recognition regarding vulnerabilities as well as the investigation associated with the essential vulnerabilities. It is vital that the organization adopts the internal scans which is regarded as being the kind of vulnerability management which can help in the identification of the loopholes in the given transportation sector which may be associated with damaging the network associated with the company. It is also vital to consider the measure regarding effectiveness associated with the internal scans to make sure that it is the most appropriate strategy that is available (Easttom, 2020).
  • 11. Part 2: Vulnerability Scanning Tool Evaluation and Recommendations The identified OpenVas scanning tool is considered to be an open source vulnerability scanning tool which in my personal opinion is considered to be an industry standard. The key benefit for the use of the OpenVas scanning tool is the transparency aspect and it usually does not raise any security associated concerns. It is associated with patching any kind of security issues which may arise since it is easy to locate the bugs but it is also vulnerable to hacking (Easttom, 2020). To ensure feasibility in its use, I would recommend that the identified Mercury USA is involved in the adoption of the OpenVAS scanning instrument because of the capability it has to offer a comprehensive report. Part 3: Business Case Example In the situation whereby the company does not take part in the implementation of the given recommendation, there is the risk of ransomware. For the given device to effectively function again, the identified malicious program is associated with infecting the identified protection systems as well as is involved in showing messages requesting for a fee as the charges. It is vital to note that ransomware can also create an essential disruption regarding normal operations at the Identified Mercury USA and in some cases data loss. Ransomware is usually known to be involved in the damage of the companies’ reputation and it is vital for the mercury USA recommendations to be followed to avoid such cases (Foreman, 2019). Conclusion Through the adoption of the internal scans as a key vulnerability management kind of process to help in safeguarding the identified transportation sector, the given company can effectively solve most of the cybersecurity breach situations and prevent any kind of losses. Collaboratively with the identified OpenVAS scanning tool, the internal scans can assist the organizations in safeguarding of the essential information and in the reduction of the risk regarding
  • 12. vulnerabilities like the malware infections (Zakareya, 2018). Eqbal Danish Cybersecurity Threat Analyst Mercury USA References Foreman, P. (2019). The vulnerability experience. Vulnerability Management, 7-34. doi:10.1201/9780429289651-2 Easttom, C. (2020). Vulnerability assessment and management. The NICE Cyber Security Framework, 241-258. doi:10.1007/978-3-030-41987-5_12 Zakareya, O. (2018). Vulnerability and forensics associated with the smart grid: Cyber attacks. International Journal of Computer Applications, 181(22), 32-38. doi:10.5120/ijca2018917952 Project Work for Week 6: Begin the Presentation to Management Using your two previous deliverables and the Nessus scan report from Project 2, create a five- to 10-slide presentation that will persuade management to implement a VM process and purchase the commercial vulnerability scanner Nessus as a key component of that VM process. You will provide voice annotation for all slides in the following format: · five to 10 slides maximum; limit bullets to no more than six per slide · voice annotation for every slide (excluding the reference slide) · a reference slide with one to two quality sources Use the Presentation to Management Template. In the template, you will see specific instructions in the document. Delete the instruction text before you submit your project.