Deliver an it risk assessment case study

Assignment Help Computer Network Security
Reference no: EM13671075

Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector. 

Senior executives in both business and technology divisions within Aztec have collected a portfolio of projects from their respective strategists that could be potentially funded for deployment. The portfolio includes projects such as 

. Allowing employees to bring their own devices (laptops, tablets and mobile phones for example) into the workplace to be used as their main or sole devices in achieving their work tasks 

. Migrating business-critical applications and their associated data sources to an external Cloud hosting solution 

. Outsourcing key IT functionality such as the network, desktop management or application development to a third party 

. Upgrading or introducing a major technology such as mobile platforms and applications, migrating to an improved networking technology (such as IPv6), creating a corporate-wide email archive for compliance purposes, or upgrading applications and desktop operating systems. 

Each of these potential projects carries significant IT risks which will need to be managed to support the business case as to whether the project should go forward. In this case study you are the IT Risk Assessment lead at Aztek, and your role is to be the interface between business stakeholders and technologists, translating potential technical difficulties into risk language to facilitate effective decision-making by stakeholders. 

For the Aztek case study you will need to select one of the projects from the list above for a thorough IT Risk Assessment. You may select another project beyond those listed above with the approval of the subject coordinator, and you may wish to select a project that is relevant to your workplace for example.

Reference no: EM13671075

Questions Cloud

What elements of the projects might imply greater : What elements of the projects might imply greater or lesser riskiness
Explain how many grams of molten iron will be produced iron : The thermite reaction is given by- Fe2O3(s) +Al(s) ------> Fe(l) + Al2O3(s). Explain how many grams of molten iron will be produced if 2.29 moles of iron (III) oxide is consumed
U.s supreme court case on police misconduct : U.S Supreme Court Case on Police Misconduct
Early and middle adulthood option : Early and Middle Adulthood Option
Deliver an it risk assessment case study : Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.
Research the term venn diagrams in the university library : Research the term Venn diagrams in the University Library or on the Internet.
The name of the course text is organization behavior : The name of the course text is Organization behavior
Affirmative action in federal procurement : The topic of "Affirmative Action in Federal Procurement. Please discuss the current regulatory and legal framework with any key legal cases, be sure to address the most current trends in area
Compare and contrast pure competition with monopoly : 1. Compare and contrast pure competition with monopoly from a pricing perspective. If you were a shipper, which would you prefer? Which would a carrier prefer?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

  Verify the correctness of your decryption

In a public-key system using RSA, you intercept the ciphertext C = 13 sent to a user whose public key is e = 23, n = 143. What is the plaintext M?

  Cybersecurity research paper

Identifying and explaining how the breach occurred and identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

  The relation between passwords and key size

the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password

  Describe why important to secure windows-unix from servers

Describe why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  You are a senior network engineer at a technology firm

you are a senior network engineer at a technology firm. your company has 500 employees. your ceo meets with you and

  Analyze the basic attacks that occur in cyberspace each

analyze the basic attacks that occur in cyberspace. each type of threat actor attempts to achieve certain goals

  Data security or computer-network security

The second research report should include applications of the security theories, principles, and techniques of the subject.

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd