The writer is very fast, professional and responded to the review request fast also. Thank you.
Mercury USA is a small- and medium-sized business (SMB) in the transportation sector with 400 employees.
You’ve just been hired by Mercury USA as the first cyber threat analyst on the team and will work within the existing Information Technology department. Mercury USA has an urgent interest in addressing security vulnerabilities.
Judy “Mac” McNamara, the manager of IT services, said the chief executive officer (CEO) recently learned via a mandatory breach disclosure that a competitor was a victim of ransomware. The firm in question lost a significant amount of intellectual property and customer data and is facing expensive litigation, government fines, and loss of customer confidence. These issues are likely to result in bankruptcy.
Thus, executive management would like to prevent Mercury USA’s critical data (e.g., order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software) from falling into the wrong hands and threatening the survival of the business.
Message from the CEO
The CEO of Mercury USA has recorded a video message for all employees. Watch this video before starting the projects.
Transcript
An Important Message From the CEO
As the cyber threat analyst at Mercury USA, you will be expected to identify security-related issues that hackers could use against the company. You will begin by addressing the security vulnerabilities present in the IT infrastructure of the company and develop a way forward that helps to prevent and deter attacks.
You will be completing three projects for this course:
Part 1: Vulnerability Process and Assessment Memo—A two- to three-page memorandum outlining the VM process in which you will use a sample vulnerability scan report to assess security posture and develop a recommended VM process (Week 3)
Part 2: VM Scanner Background Report—A four- to six-page background report to review a commercial scanning tool and provide a recommendation (Week 5)
Part 3: Presentation to Management—A five- to 10-slide “pitch” to executive management outlining your assessment of Mercury USA’s security posture, the business need, and seeking a decision on purchasing the commercial tool (Week 7
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more