Sign In
Not register? Register Now!
Pages:
14 pages/β‰ˆ3850 words
Sources:
12 Sources
Style:
APA
Subject:
Business & Marketing
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 60.48
Topic:

Hackers and the Strategy of Using Ransomware

Other (Not Listed) Instructions:

You will integrate and enhance your ideas and notes to develop a comprehensive, research-based analysis for your new startup company. This is an individual assignment.
The problem that you are defining is the basis of the technology-based startup company that you will design this semester. Be sure to consider problems that can be solved with a technology-based product that you can create, or lead the creation of with a team that you can build. Startup ideas may include mobile apps, software, hardware, or related technologies that serve as the foundation, or key differentiation factor, of the startup. A cafe that has a website is not considered a technology-based startup. A startup company that is creating inventory management software for cafes would be considered a technology-based startup for the purposes of our course.
Focus on a problem for which you can develop and launch a solution within 12 months. Your solution should leverage your skills and relationships, and require initial funding of no more than $25,000 to bring the product to market. My topic is cybersecurity that more detailed sub-questions will be provided later.
The total length of this analysis should be approximately 4,000 words in total for questions 1 through 11. Be sure not to exceed 4,000 words in total. The final form is not required to be an essay but must answer all 11 questions.
Answer each bulleted question separately in the Google Doc or Word Doc
Be sure to include in-text citations (Links to an external site.) for each response that aligns with your references to support your analysis for this question.
There should be at least unique 10 reference sources (i.e. 10 different article, reports, etc.). While you may repeat a citation (i.e. reference one report multiple times), referencing one report multiple times counts as one citation.
As these references should be specific to the industry, competitors, market, etc. for your new venture, do not include the textbook, articles, lectures, or lecture slides for the course as references.
Also be sure to include a breath of references; at least ten different references should used in this project.
In your response to question 12 at the end of this assignment, list the full reference in APA format (Links to an external site.).
You do not need to include a title page or abstract.
1. The Problem
What is the problem?
What evidence supports that the problem exists?
Is the problem urgent, underserved, unworkable, and/or unavoidable?
Is the problem conspicuous and/or critical?
2. The Customer
Who is the target customer?
What are their needs and wants?
What is the market size?
3. The Value Proposition
What gains will customers experience? These are the benefits which the customer expects and needs, what would delight customers, and the things which may increase their likelihood of adopting your product.
What pains will customers experience? These are the negative experiences, emotions, and risks that the customer may experiences in adopting your product.
4. The Minimum Viable Product
Who are the competitors and their customers?
What are our minimum viable features?
Are our features valuable and rare?
What is the prototype? Include a link to a Google Doc or Google Slide with a set of wireframes (Links to an external site.) if you are creating an app or software, or a diagram (Links to an external site.) if you are creating a physical product.
5. The Price
What are the competitors’ pricing strategies and prices?
What is our pricing strategy and prices?
6. The Placement Strategy
What are our distribution channels?
Who are our intermediaries?
7. The Promotional Strategy
What is the advertising plan and budget?
What is the public relations plan?
What is the personal selling plan?
What is the direct marketing plan and budget?
What is the sales promotion plan and budget?
8. The Sales Process?
What is our sales process?
9. The Revenues and Costs
What are our itemized estimated costs in year one and year two?
What types of revenue streams are used by competitors?
What types of revenue streams will we use?
What are our estimated revenues in year one and year two?
10. The Funding Plan
What are our funding requirements?
Who are our candidate sources of funding?
11. The Team
Who are the founders?
Who are the advisors?
Who are the key partners?
12. Reference Page

Other (Not Listed) Sample Content Preview:

TERM PROJECT
Student Name
Instructors Name
Course Title
Date of Submission
1 The problem
Hacking
Hackers employ the strategy of ransomware. Users' data is held hostage until a ransom is paid, which is usually rather expensive. In addition to email, these assaults can be launched by visiting an infected website, clicking on an online ad that contains malicious code, or by hackers exploiting network flaws to get access (Mohurle & Patil, 2017). Ransomware may gain access to a computer through a variety of methods. Sending spam attachments disguised as legitimate files is one of the most prevalent methods of delivering malware. To gain control of a computer, they must be downloaded and opened, and if they contain social engineering tools, the user is likely to give them administrator access. NotPetya, a more aggressive kind of ransomware, exploits security weaknesses to infect systems without the need to trick victims. Most malware encrypts the user's files once it has taken over the virus or malware, but there are several other possible actions. As far as ransomware goes, the Infosec Institute offers a wonderful, in-depth explanation of how different types of ransomware work. Most importantly, the files can only be decrypted using a mathematical key that only the attacker can access. If the victim sends the hacker bitcoins in an untraceable way, they can get their files back.
What evidence supports the idea that the problem exists?
A phishing assault is the means via which the issue is felt. As was previously indicated, most ransomware assaults occur in the form of email attachments (eSecurityPlanet, 2022). A comprehensive email filtering and monitoring system is needed in this instance, which flags questionable communications and provides managers with information about why the email was detected (Mohurle & Patil, 2017). A.zip or.exe file attachment, for instance, should warn the system administrator because it is almost certainly dangerous.
Is the problem urgent, underserved, unworkable, and/or unavoidable?
The threat of ransomware must be addressed immediately by the company to avoid things getting more complex. Robust monitoring apps, frequent file backups, anti-malware software, and user training can effectively mitigate the procedure (Mohurle & Patil, 2017). Even though there is no such thing as total protection from cyberattacks, an organization may significantly lower its vulnerability.
Is the problem conspicuous and/or critical?
Businesses are still at risk from ransomware, which has not gone away. Organized email phishing assaults on workers are still employed to gain access to the business network, as is the search for weaknesses in unreachable systems (Mohurle & Patil, 2017). Having a well-thought-out contingency plan can significantly lessen the impact and harm of a cyber attack.
2 The customer
Who is the target customer?
Ransomware attackers choose their victims based on a variety of factors. Because of their smaller security teams and more dispersed user bases, startup enterprises are more likely to be targeted by attackers because it is simpler to infiltrate their defenses. On the other hand, some corporations are attractive targets because they appear to be ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Other (Not Listed) Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!