|Due By (Pacific Time)
||11/30/2016 10:25 am
Recommendation for a case study)
atleast 2 reputable referenecs
APA format with url listed in reference
Early one morning at work, CEO Alice Johnson asks if you have a moment to chat. I need your expertise and advice on a complicated situation for the company regarding an international hacking lawsuit. In her office, Alice explains that CyberTech is serving as the cyber forensics consultant for a law firm handling the suit from a 2015 hack of the Office of Personnel Management, OPM. The OPM hack compromised background information on millions of workers. In a related case Anomalous, a non-US gray hat hacking group suspected in the OPM breach case, is claiming that US-based Equation Set attempted to hack its facilities. So we have a non-US and a US set of test hacker groups involved. With Anomalous, the non-US group, being a client defendant in one case against Equation Set, the US group, and as a suspect in the OPM breach. But Alice then outlines why the case is problematic. Along with the OPM victims, CyberTech represents client.s from some of the OPM breach suspect companies in unrelated cases, which could appear to be a conflict of interest. This could affect the way our company is perceived by others. We need to maintain our image as an unbiased cyber security consultant. Should CyberTech remain on both the OPM breach investigation and the overseas case at the same time? Or should we drop one of the cases? Apply your critical thinking and analytical skills to figure out what happened what we know and don't know, and how the company might remedy this situation.
a paper with your recommendations.
atleast 2 reputable referenecs
Structure your paper with these major headings:
2. Explanation of the Issue
3. Analysis of the Information
4. Analysis of Alternative Viewpoints, Conclusions, or Solutions
5. Personal Conclusion and Suggestions for Remedying the Situation
**APA format with url listed in reference**
some helpful info:
critical thinking involves thinking clearly and systematically, and includes:
- formulating ideas succinctly and precisely
- identifying the relevance and importance of ideas
- understanding the logical connections between ideas
- identifying, constructing, and evaluating arguments, claims, and evidence
- recognizing explicit and implicit assumptions, arguments, and biases
- detecting inconsistencies and common mistakes in reasoning
- formulating clear defensible ideas and conclusions
- evaluating the pros and cons of decisions
- reflecting on one’s own beliefs and values
- applying ethical decision making
· Suggested area to focus on is to determine if a conflict of interest would exist in handling the two cases that might be related, and advise how to proceed.
· Outline the points that you want to make in the first two sections of your paper (introduction, explanation) and draft those sections
· Now that you have some understanding of the nature of the breach and the parties involved, it’s time to gather and analyze information. The Problem Analysis resources will further aid your analysis and development of the third section of your paper.
· Outline the points that you want to make in Section 3: Analysis of the Information of your paper, and draft that section
· Outline the points that you want to make in Section 4: Analysis of Alternative Viewpoints, Conclusions, or Solutions of your paper, and draft that section.
· You considered alternative viewpoints in the last step. Now you’re ready to develop your personal conclusions and suggest remedies so that your boss is well-equipped to brief leadership about the situation.
· Remember, you will need to consult outside references (at least one reputable outside resource) related to the topic to support your conclusions and proposed decisions.