Describe three threats that your company could face and explain how some of the issues are specific to big data.

Publish By: Admin,
Last Updated: 10-Jul-23
Price: $120

Assignment structure

The assignment is to develop your academic and professional skills throug a series of challenges where you will need to put into practice key knowledge and transferable skills. The assignment will be a critical report type document. You should spend sufficient time studying on your own. Yo need to demonstrate critiquing, logical argument, use of evidence, appropriate citing and referencing, knowledge of research design, and use of good English to ensure high grades.

1. Submit a report with wordcount of not more than 5000 words with t following structure:
Imagine you have managerial responsibilities at a hypothetical compan that deals with big data.
a) Provide a description of the company and its organisational structu including the security personnel (Suggested length 400--600 words
b) Recently, an employee has forwarded the following email hoax to all the other employees.

HOW TO PROTECT YOUR EMAIL ADDRESS BOOK

I learned a computer trick today that is really ingenious in its simplicity. I received it from a friend.

As you may know, when/if a worm virus gets into your computer it heads straight for your e-mail address book, and sends itself to everyone in there, thus infecting all your friends and associates. This trick won`t keep the virus from getting into your computer, but it will stop it from using your address book to spread further, and it will alert you to the fact that the worm has gotten into your system.

Here`s what you do: first, open your address book and click on "new contact", just as you would do if you were adding a new friend to your list of e-mail addresses. In the window where you would type your friend`s first name, type in "AAAAAAA", Also use address AAAAAAA@AAA.AAA

Now, here`s what you`ve done and why it works: The name AAAAAAA will be placed at the top of your address book as entry #1. This will be where the worm will start in an effort to send itself to all your friends. But, when it tries to send itself to AAAAAAA, it will be undeliverable because of the phony e-mail address you entered. If the
first attempt fails (which it will because of the phony
address), the worm goes no further and your friends will not be infected.

Here`s the second great advantage of this method: If an e- mail cannot be delivered, you will be notified of this in your INBOX almost immediately. Hence, if you ever get an e- mail telling you that an email addressed to AAAAAAA could not be delivered, you know right away that you have the worm virus in your system. You can then take steps to get rid of it!