本次英国论文代写主要为一篇案例研究报告论文
1. Carefully read both case studies below, identifying and making notes on key points.
o Norsk Hydro
o Cyber Security Incident Report – Norsk Hydro
o Finablr
2. Spend time researching sources of information in the public domain (or available in your
workplace) to place these two case studies in a wider context (try Googling Colonial Pipeline
Attack).
3. Critically compare the weaknesses in the security systems and the responses from both
companies to the ransomware attacks and identify the business impact to both.
Follow this structure for the critical comparison:
1. Compare and contrast the level(s) of transparency and timeliness the incident response, any
differences in incident handling you have detected (if any) between the two cases. should either
of the two companies have simply paid the ransom demanded? If not, why not? [500 words]
2. To what degree do you think in the case of Finablr the cyber attack may have acted as an early
warning sign, a kind of ‘canary in the coal mine’ for wider company governance standards, and
possible IT investment deficiencies? [250 words]
3. More generally what risk does ransomware pose to your own business? (if you are taking time
out from a cyber or IT security job role at the moment, frame your response in relation to a
generic e-finance vertical market chosen exemplar). [250 words]
4. Learning the lessons from these attacks is vital. Draw up an idealised incident response timeline
(expressed in days), identifying your actions and responses to a ransomware cyber attack upon a
generic fintech (e.g. e-banking ) provider. You should show adversarial actions too. (Both
preparatory, initial launch and subsequent to the attack, hence your defence).
o You can complete this as a table, with suitable annotated entries showing a maximum of
20 rows extending over a time period extending to no longer than two calendar months.
5. Submit an annotated bibliography showing all references consulted (cross-reference these to
each of the tasks above—aim to cite approx. 15-20 carefully chosen sources.