Chat with us, powered by LiveChat Defend laws, rules, regulations, and ethical principles relating to technology and the workplace. | Coms Paper
+1(978)310-4246 credencewriters@gmail.com
  

Assignment Instructions and RequirementsFirst, download the required template for this assignment: Email TemplateUse of this template is required. Do not alter the formatting; simply fill in the content as explained below. Failure to submit the assignment using this template will result in zero points.Scenario:You are IT manager for 504 Technologies and have discovered a data breach. You have taken the responsibility to contact customers to explain the situation. You realize you must explain the attack in terms the average customer will understand, and need to assuage their fears. Make sure you use professional wording and avoid emotional content.Research:Check the list of potential attacks in the Unit Reading PDF. Choose only one kind of attack (for example, just a virus, not also a worm and Trojan). Then find a suitable source online that explains what happens in this kind of attack.Write in the template:The “to” field has been filled in.CC yourself using your PG student email address.Write a suitable subject line that alerts the recipients to the importance of your email. Do not use all-caps or characters: use meaningful wording.Start the email with a suitable salutation.In the body of the email, include the following, in order. Each item listed below should be placed in a separate paragraph (single spaced with a blank line between each paragraph).What happened – explain the attack in your own words.How this affects the email recipients (customers).What your company is doing to correct the issue and protect the customer from future breaches.Provide one communication venue for questions: direct them to the company website (http://504technologies.net), indicate there is a FAQ sheet attached to the email, or provide a toll-free (made-up) phone number for their questions. Do not actually create a website or FAQ sheet; simply direct them to it.End the email with four short lines: your first and last name, a suitable job title, and the company name, followed by the URL to the source you used to learn about this kind of attack.Other requirements:Write at least 200 words, but not more than 280 words, not including the salutation and signature. All parts of this assignment must fit on the single page in the template.Write entirely in your own words. Do not copy or quote from your source.Provide the content in paragraph form, without lists or other content.All content in the body of the email must be left-aligned.Since this is an email, in-text citation is not appropriate. However, remember to include the URL to your source at the bottom of the email.

error: Content is protected !!