) Quickly summarize the key aspects of the data breach (1 min.) (2) NIST CSF reflection (1 min.)

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:

 

Discussion: Misadventures of a Nation State Podcast

Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.

Instructions:  The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.

Keep each discussion sub-topic focused and to approximately 1 minute  for a TOTAL video of 5 minutes (give or take a few seconds).

Need the script out each segment of your video beforehand to ensure the video flows, is informative, and meets the appx 1 minute per topic (5 minutes total) goal. - A thumb rule to use is 100-120 words per minute of speech. This means you should prepare appx 500 words combined for all 5 sub-topics.

The format for this video discussion will be as follows:

(1) Quickly summarize the key aspects of the data breach (1 min.)
(2) NIST CSF reflection (1 min.)
(3) CIS CSCs reflection (1 min.)
(4) ACSC Strategies to Mitigate Cyber Incidents reflection (1 min.)
(5) MITRE ATT&CK reflection (1 min.)

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Protection Strategies
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education