Discuss the importance of security in the design of system

Assignment Help Management Information Sys
Reference no: EM131358102

Software Information Assurance-

Prior to developing an information security plan, it is important to understand and evaluate potential security risks before formulating prevention strategies. For this assignment, you will continue the planning process by adding the Risk Assessment section to the Information Security Assurance Implementation Plan. You will analyze and perform a risk assessment of the organization's information systems. You will also discuss the importance of security in the design of information systems.

The project deliverables for Week 2 are as follows:

Update the Information Security Assurance Implementation Plan title page with a new date.

Update the previously completed sections based on the instructor's feedback.

Risk Assessment

Perform a risk assessment of the organization's network management, server management, Web and non-Web applications, data management, and cloud computing.

Identify the threat vulnerabilities, affected assets, impact, and possible countermeasures identified in the previous section.

Discuss the importance of security in the design of information systems.

NETWORK SECURITY- Analysis of the Network

When it comes to IT security, you must do more than follow the examples of other companies, regardless of how successful they are. No two organizations will encounter the same problem. The best approach to providing the best level of security is to conduct a risk assessment of your organization,identify what your assets are, what your threats are, and what the probability of the threats occurring may be. This analysis will allow you to create the network defense plan that is uniquely tailored to your organization and situation.

For this assignment, you will write the Risk Assessment section of 5-6 pages, and add it to the Network Security Plan document. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

Assignment Details:

Update previous sections of your document based on feedback. (Will email separately)

Update the Table of Contents.

Update the date on the cover page.

Risk Assessment Section

Conduct an inventory of devices within the chosen organization's network using appropriate tools.

Provide a summary of the number of desktops, laptops, network printers, and servers.

Identify key assets.

Assets also include records and sensitive information that requires special protection.

Prioritize each asset or group of assets, and assign a value to each.

Create a subsection that will identify and describe the risks within the environment.

Do not forget natural disasters.

Include the likelihood that the risk could occur.

Provide a list of the tools and methodology that you used to conduct the risk assessment.

Be sure to update your Table of Contents before submission.

Please use Google Scholar to reference unless it is an academic/government source

Reference no: EM131358102

Questions Cloud

Creative tool such as powerpoint : Explain how Social Engineering can be seen as a threat to the corporate entity by using a creative tool such as PowerPoint®
Analyze means in which data moves within the organization : Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards.
Compute the bending stiffness of a cantilever i beam : Compute the bending stiffness of a cantilever I-beam (given Figure) of length L = 30 cm, subjected to a tip-shear force Vz = 445 N. The dimensions of the beam are: h = 2.5 cm, b = h/2, t = h/16.
Difference between grading and responding : What's the difference between "grading" and "responding?" "What does Hesse identify as the "top considerations" when an instructor responds to writing?
Discuss the importance of security in the design of system : CS661,CS653:Prior to developing an information security plan, it is important to understand and evaluate potential security risks before formulating prevention strategies. For this assignment, you will continue the planning process by adding the R..
Identify the problems that were experienced : 1. Identify the problems that were experienced. 2. Discuss what preventative measures are now suggested to avoid similar issues in the future.
How much does strength of the material need to be increased : A laminate of undisclosed configuration subjected to undisclosed load has a reported first ply failure (FPF) strength ratio R = 0.5. Note: the material, laminate stacking sequence, and the loads are not known.
What percent of the total complaints can be attributed : An avant-garde clothing manufacturer runs a series of high-profile, risqué ads on a billboard on Highway 101 and regularly collects protest calls from people who are offended by them. What percent of the total complaints can be attributed to the mo..
Identify the business problems in the given case : Identify the business problems in this case. Determine whether to use a traditional or iterative project method (e.g., RAD and Agile) in this case and explain why or why not.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Role of it in organizations that compete globally

Discuss whether or not backcasting is an important concept for addressing major forces that shape the role of IT in organizations that compete globally. Explain your answer

  Technology usage policiesbeing considered an ethical

technology usage policiesbeing considered an ethical company by consumers can help a company to increase its market

  Evaluate the strengths and limitations of the technology

Evaluate the strengths and limitations of the technology that supports the delivery of health care services.  Analyze current and future applications of technology for your topic

  How you can use the five-component model to guide your learn

Define each component of an information system. Define how you can use the five-component model to guide your learning and thinking about information systems.

  Discuss about the information visualization

Despite increases in computing power and network bandwidth, many user interfaces are still largely text oriented, with a few icons and illustrations. Discuss at least five reasons why text-oriented interfaces are still the most common. From the e..

  Information management system

1. Critically assess the mission, goals and importance of Information Systems Management (ISM) in the firm, using your own work organization as an example.

  Differences between scorecards and dashboards

Discuss the purpose and other considerations behind dashboards in less than one page. Highlight the differences between scorecards and dashboards; and BAM and BPM

  Major trends of the it industry

Three major trends of the IT industry and importance to resources and leadership roles - Benefits of IT to business competition and ways to work

  Briefly compare passive and active multiprogramming

Explain why file deallocation is important and what would happen if it did not occur on a regular basis. Briefly compare passive and active multiprogramming. Explain internal and external memory fragmentation. List the 4 types of memory management me..

  Population have high-speed broadband connections

Other Services Resulting From High Speed Broadband - What other services will change business models when large parts of the population have high-speed broadband connections?

  Macro-processes of global supply chainplease give an

macro-processes of global supply chainplease give an example of an assessment of the macro-processes that make up an

  The challenge for management has transitioned from a simple

over the twentieth century the ability to process information in terms of labor units has improved by a factor in the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd