Describe the process of performing a risk assessment

Assignment Help Computer Network Security
Reference no: EM131267436

Assignment: Organizational Risk Appetite and Risk Assessment

Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization has seen reports of malicious activity on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. The CIO has asked you to prepare a short document before your team begins working. She would like for you to provide an overview of what the term "risk appetite" means and a suggested process for determining the risk appetite for the company. Also, she would like for you to provide some information about the method(s) you intend to use in performing a risk assessment.

Write a two to three page paper in which you:

1. Analyze the term "risk appetite". Then, suggest at least one practical example in which it applies.
2. Recommend the key method(s) for determining the risk appetite of the company.
3. Describe the process of performing a risk assessment.
4. Elaborate on the approach you will use when performing the risk assessment.
5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe the components and basic requirements for creating an audit plan to support business and system considerations.
• Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.
• Use technology and information resources to research issues in security strategy and policy formation.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131267436

Questions Cloud

Evolution of utilizing data analytics in business : Define data analytics in general and provide a brief overview of the evolution of utilizing data analytics in business - Analyze the main advantages and disadvantages of using data analytics within the industry or company that you have chosen.
Is demand elastic or inelastic for your companys product : Is demand elastic or inelastic for your company's product or service? Why? What is the demand elasticity for your offering in an off-line world?
Determine an upper bound of the code word error : Determine an upper (union) bound of the code word error probability for AWGN and soft-decision decoding.
Evaluate quality of each in terms of read and write speed : From the second e-Activity, identify the make and model of one (1) laser printer and one (1) inkjet printer that are similarly priced. Evaluate the quality of each in terms of print speed (i.e., pages per minute), resolution (i.e., dots per inch),..
Describe the process of performing a risk assessment : Recommend the key method(s) for determining the risk appetite of the company. Describe the process of performing a risk assessment. Elaborate on the approach you will use when performing the risk assessment.
Provide a brief summary of the organization : Provide a brief summary of the organization (its culture, its industry, its product and services). Explain why a change was needed. Explain the change that was undertaken
Examine the elements of computer system performance : This discussion activity provides you the opportunity to examine the elements of Computer System Performance and how they interrelate to achieve the performance objectives.
Discuss the role that product demand played in pricing : Apple CEO Steve Jobs alluded to the price a customer may have to pay to own an iPhone when he said that the steep and sudden price change was simply part of "life in the technology lane." What did he mean?
Find the cross correlations of one sequence with each other : Generate all the Gold codes of length 7 and determine the cross correlations of one sequence with each of the others.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyze overall manner in which poor cybersecurity policy

Analyze the overall manner in which poor cybersecurity policy can disrupt business continuity. Provide at least two examples of such disruption to support your response.

  Challenges and emerging trends

Insights on best practices, challenges and emerging trends. It will be a power point presantation.

  Identity one specific control in physical security

Identity one specific control in each category and describe the control in details, including the asset that is being protected. Physical Security.

  Exploit vulnerabilities in your systems

Describe common tools and techniques for identifying and analyzing threats and vulnerabilities - Explain the risks of challenging individuals to exploit vulnerabilities in your systems.

  Telling private industry how to set up or improve security?

justify telling private industry how to set up or improve their cybersecurity?

  Explain the steps you would use to diagnose and repair

Explain the steps you would use to diagnose, and repair if necessary, spyware on the customer's computer. Also, add how you would safeguard the children from uninvited material showing up on the internet.

  Information about the cases

Most of the questions are based on actual cases, so information about the cases can be googled if wanted. (Example Search Term: Dodona I, LLC vs. Goldman Sachs & Co.)

  Explain common organizational security threats

Create either a PowerPoint presentation, or a training manual, that will help get the team to think about security. This training document should cover the following key areas: 1. Explain common organizational security threats (avenues of attack).

  Identify different computer crimes that you are aware of

Computer crime has become a serious matter; for your Discussion Board post, consider the following: Identify 3 different computer crimes that you are aware of

  What is the new technology

What is the new technology - what does it do and what are the special features it has and when is it coming out in the market and how much will it cost?

  Develop the identity management and security awareness plan

Utilizing your comprehensive security plan outline as a guide, develop the identity management and security awareness training plan strategy for the organization. Upload the assignment in Microsoft Word format.

  Create a three page policy for business continuity

Create a three page policy for business continuity for the White House security staff. Prepare a plan based on the critical nature of information that is presented within the executive department and military strategies that are reviewed for actio..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd