) Quickly summarize the key aspects of the data breach (1 min.) (2) NIST CSF reflection (1 min.)

Principles of Information Systems (MindTap Course List)
12th Edition
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter4: Software: Systems And Application Software
Section: Chapter Questions
Problem 4SAT
icon
Related questions
Question

Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:

 

Discussion: Misadventures of a Nation State Podcast

Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.

Instructions:  The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.

Keep each discussion sub-topic focused and to approximately 1 minute  for a TOTAL video of 5 minutes (give or take a few seconds).

Need the script out each segment of your video beforehand to ensure the video flows, is informative, and meets the appx 1 minute per topic (5 minutes total) goal. - A thumb rule to use is 100-120 words per minute of speech. This means you should prepare appx 500 words combined for all 5 sub-topics.

The format for this video discussion will be as follows:

(1) Quickly summarize the key aspects of the data breach (1 min.)
(2) NIST CSF reflection (1 min.)
(3) CIS CSCs reflection (1 min.)
(4) ACSC Strategies to Mitigate Cyber Incidents reflection (1 min.)
(5) MITRE ATT&CK reflection (1 min.)

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Protection Strategies
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm…
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning
CMPTR
CMPTR
Computer Science
ISBN:
9781337681872
Author:
PINARD
Publisher:
Cengage