Create a list of information security vulnerabilities

Assignment Help Management Information Sys
Reference no: EM131205339

Select an organization that you are familiar with or an organization from a published case study.

Find case studies through the following sources or through a faculty-approved source. Suggestions are as follows:

Search within University Library for these periodicals
Information Week
CSO
SC Magazine

The CEO of your selected organization has requested an enterprise security plan from your team. The first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This list should be fairly exhaustive. Many vulnerability and threat pairs will not make the final cut for remediation, but an organization can only properly prioritize these if it has fully covered all of the risks.

Create a list of 30 information security vulnerabilities with related threats relevant to the organization. Keep in mind:

Most vulnerabilities will have more than one related threat.

Cover both physical and logical vulnerabilities.

Place your list in the first two columns of a table in a Microsoft Word or Excel document. The table will resemble the following:

Vulnerability

Threat

Probability

Impact

Suggested Mitigation Steps

 

 

 

 

 

 

 

 

 

 

 Include at least 15 vulnerabilities in your list involving physical security and at least 15 involving logical security.

Note: The other three columns will be used next week. Each row in the table should be a specific vulnerability with a related threat, though it is most likely that some vulnerabilities will have more than one possible threat in the table.

Reference no: EM131205339

Questions Cloud

Identity gaps in nursing knowledge : Identity gaps in nursing knowledge - Determine the need to refine or clarify a concept (a phenomenon of interest); clarify the meaning of terms.
Uses the aging of accounts receivable method : Friedman Company uses the aging of accounts receivable method. Its estimate of uncollectible receivables resulting from the aging analysis equals $26,000. The unadjusted credit balance in the Allowance for Doubtful Accounts account is $8,400 What is ..
Draw dependency diagram to show the functional dependencies : Draw a dependency diagram to show the functional dependencies that exist in this relation - Decompose the Home Library relation into a set of 3NF relations and draw a dependency diagram for each of the 3NF relations.
Prepare classified balance sheet in report form : The following information was obtained from the accounts of Lukes, Inc., as of December 31, 2012. It is presented in scrambled order. Prepare a classified balance sheet in report form. For assets, use the classifications of current assets, plant and ..
Create a list of information security vulnerabilities : The CEO of your selected organization has requested an enterprise security plan from your team. The first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This lis..
Define a collective choice procedure as satisfying : Define a collective choice procedure as satisfying the ‘‘top condition'' if an alternative is never among the social choices unless it is on top of at least one individual preference list. Prove or disprove each of the following:
Present value exceeds the projected net present value : Ginger Company recently installed a postaudit program. To motivate their employees to take the program seriously, Ginger established a bonus program. Managers receive a bonus equal to 10 percent of the amount by which net present value exceeds the pr..
Self-employed with an annual salary : Paul Stoddard is self-employed with an annual salary of $90,000. He claims 1 exemption. His social security tax rate is 12.42%, Medicare is 2.9%, and his estimated federal income tax rate is 14%. How much quarterly estimate tax must Paul sent to the ..
Write an informative speech for my communication : Write an informative speech for my communication. - This is an informative speech that needs to be outlined 1st.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the concept of an information system

The Wal-Mart case study introduced you to how that company used information systems to become the world's leading retailer. Wal-Mart has continued to innovate and is still looked to as a leader in the use of technology

  Describe the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department

  What is the required rate of return

Tronic Technology - What is the required rate of return (yield) on the preferred stock?

  How a standard such as the ois model assists networks

The developers of the OSI model envisioned a detailed specification of interfaces. Instead, it has become a common reference model that is used by developers to standardize interfaces. Give your opinion on what you believe would happen to networks..

  Find appropriate cases on the web

Find appropriate cases on the Web

  Does the approach scale for large organizations

What do you think about Ying's approach to the automation of classifying information content for the purpose of managing that information? Does the approach scale for large organizations? How would you try to improve on his approach if it were to..

  What you have learned about informatics systems

Consider what you have learned about informatics systems and how we use data to improve patient care and decrease costs. How is data collected, stored, and used to protect patients and improve care

  Suggest strategy and process for chief executive officer

As a newly minted CIO, you have been hired to join a company without a history of project best practices. Suggest strategy and process for your Chief Executive Officer (CEO) to develop standards for your organization that is without any such organ..

  Common software applications and functions for businesswhat

common software applications and functions for businesswhat are the functions of three common computer software

  How would harley-davidson''s business be affected

How would Harley-Davidson's business be affected if it decided to sell accessories directly to its online customers? Include a brief discussion of ethics involved with this decision

  The value of the bond is

The value of the Enterprise bonds if the interest is paid semiannually is $ -  The value of the Enterprise bonds if the interest is paid annually is $.

  Clarify the major role each department plays with is

Clarify the major role each department plays with IS. Explain the importance of information systems management

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd