IT & Networks for Business
1) Objectives of the Individual ProjectThrough the preparation of this project, students are expected to have exposures on the following learning objectives: (1) Gain a good understanding of those information and communication technologies, which are usually used in the business environment;(2) Be aware of legal, ethical, geographical, and other issues related to these technologies; and(3) Be aware of the importance of information security, and have a basic understanding on information systems auditing. (2) Requirements and DeliverablesThe requirements and deliverables of the project are as follow: (1) This is an individual project; and(2) The written report is due on August5, 2017 (Saturday). The report should have at least 1,500 words (excluding bibliography) and should be in APA format
(http://www.apastyle.org/learn/tutorials/basics-tutorial.aspx). If you need further clarification, please let me know). (3) Assignment ScenariosOh My God! Our System is being Locked!Jess Andersen is the Minister of Social Welfare and Health in Fortuna Island. In Monday morning, just before the routine Morning Prayer with the Governor, Jess gets an
urgent call from her subordinate, i.e., Peter Nixon, who is the Director of Social Welfare.Peter: “Jess, we have a problem. The central computer of the Social Security System of my agency is being locked. The hacker sends us a message and blackmails us.”Then, Peter sent a message through the Government Confidential Email system with a picture attached as follows. Jess: “What the…. What’s the hacker asking for?”Peter: “They asked us to pay 1,000 Bitcoin (approximately $2.5M) within the next 48 hours to release the key to unlock our system!”Jess: “…… We need to inform other government agencies about this crisis. We also need to inform the Minister of Security. I will report this to the Governor immediate.
Also, can you work with the relevant parties to prepare a written report for me to present to the Governor later today? ….. ”The following are the information that you need to include in your report:(a) Please provide a brief account of the malware(s) that is described in this case. (Note: There may be more than one type of malware fits the description).(b) Please provide a brief account of Bitcoins. Also, please provide a brief account on why cybercriminals like to ask the victims to use Bitcoins or other online
currencies to pay the ransom.(c) What procedures and policies that we need to implement in our agency to reduce the chance to be a victim of this type of attack?Grading Criteria:Your performance will be graded based on the following criteria:? Brief account of the malware involved (25%)? Brief account of Bitcoins (25%)? Development of Policies / Procedures (25%)? Writing Clarity and Referencing