Develop potential controls that the company could use

Assignment Help Computer Network Security
Reference no: EM131187813

Assignment 2: Identifying Potential Risk, Response, and Recovery

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five page paper in which you:

1. For each of the three or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

2. For each of the three or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

3. Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

4. Draft a one page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

5. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131187813

Questions Cloud

Determine the maximum stirrup spacing allowed for this beam : Using the two spacings determined in parts (a) and (b), devise an appropriate stirrup spacing layout for this beam.
Most effective contemporary union leaders : Who was one of the most effective union leaders during the 1930s and 1940s? Would this leader be effective now? Why or why not? Who is one of the most effective contemporary union leaders (from the 1970s to today)?
How large should the sample sizes be for each : Assume the branch manager requested estimates of the mean selling price of Gulf View condominiums with a margin of error of $40,000 and the mean selling price of No Gulf View condominiums with a margin of error of $15,000. Using 95% confidence, ho..
Full analysis of a topic covered in class : The research paper will consist of a full analysis of a topic covered in class, (Research topic: Transportation Strategy: (The integration of intermodal transport of maritime and motor).
Develop potential controls that the company could use : For each of the three or more malicious attacks and / or threats identified in Assignment 1, develop potential controls that the company could use to mitigate each associated risk.
Reducing guinea worms in asia and sub-saharan africa : Your discussion must include the following: health condition, global importance of the health condition, intervention or program, cost-effectiveness, and impact. Describe at least 2 ways these environmental and organizational challenges wer..
Describe the characteristics of the perfect manager : Write a one to two (1-2) page paper in which you describe the characteristics of the perfect manager to see a company through all stages of organizational growth
Discussion on a project management topic : This activity will provide you with an opportunity to engage in discussion on a project management topic that was covered in this module. The class interaction will foster a learning environment in which you will learn from each other's experience..
Additional research or academic information : Incorporate additional research or academic information to support your presentation. Format your PowerPoint® speaker notes according to APA guidelines.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Program to strip all occurrences

Write a program to strip all occurrences of these characters: '(', ')' and '-'. Also, strip all the leading and trailing whitespace characters. Display the stripped phone number

  Assess the levels of responsibility between government

write a three to fivenbsp page paper in which youdescribe the impact and the vulnerability of the scada stuxnet worm

  Coding of binary information and error detection

Coding of Binary Information and Error Detection

  Describe risk-related issues associated with cloud computing

Isn't hard to appreciate something when criminals continue to take advantage of this resource. Shirin and class, according to chapter 1, please describe the risk-related issues associated with cloud computing?

  Procedure to select key uniformly at random from keys-hash

Describe a procedure that selects a key uniformly at random from among the keys in the hash table and returns it in expected time O(L.(1 + 1/α)).

  Find the checksum at the sender site

This problem shows a special case in checksum handling. A sender has two data items to send: Ox4567 and OxBA98. What is the value of the checksum?

  Sarbanes-oxley act

Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: Sarbanes-Oxley Act

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Distinguish physical security from logical security and

question 1 imagine a local financial company just expanded its operations into five branches connected over a broadband

  How the companycan go online

How the company(luton) can go online, steps in which they should take before going online, security threat and have a disaster recovery plan.

  What is the difference between authentication and

part 1 review questions what is the difference between authentication and authorization? can a system permit

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd