Explain in detail why the risk management is important

Assignment Help Risk Management
Reference no: EM13782201

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13782201

Questions Cloud

Science of psychology differs from other scientific fields : How do you think the science of psychology differs from other scientific fields; for example, biology? How do the steps of the scientific method ensure reliability for a psychologist's findings about human behavior?
Databases can grow in data structure and data capacity : Databases can grow in data structure and data capacity throughout time. At certain times, it is necessary to perform optimization techniques in order to ensure optimal performance of the database.
About raise negotiation : What are your sources of power?
Individuals regarding positions in society : Using the textbook and the Online Library, write a 1500-word paper using APA standards that focuses on the following: Interview two different individuals regarding their positions in society. Analyze their responses regarding:
Explain in detail why the risk management is important : After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization.
Curriculum barrier case study : Explain how each instruction strategy and instructional technology device fit into the TPACK framework. Explain how safe, legal, and ethical use of digital information and technology, including the respect for copyright, intellectual property, and ..
Opinion of fascism-national socialism : What is your opinion of fascism, national socialism, or state socialism, depending on where you live, and why do you have that opinion? Do you think you will join one of these movements, why or why not? Where do you hope your country will be in a ..
How can public interest be achieved by public administrators : What is public interest and how can public interest be achieved by public administrators. Explain why collaboration is important for effective public management in the 21st century

Reviews

Write a Review

Risk Management Questions & Answers

  Develop a new application system for your business partner

You have been assigned as the manager on a project to develop a new application system for your business partner. You were given two weeks to develop a project plan and high level cost estimates.

  Problem 1bond abond

problem 1bond abond bunitmaturity47yearscoupon56annualprice101.79102.85-you knowfor certainthat the 3 year rate in 4

  You are about to take over moneyplays bank a small but

you are about to take over moneyplays bank a small but lucrative financial institution. you have hired new staff and

  Risk management and hedging strategy using swapsdebt for

risk management and hedging strategy using swapsdebt for equity swaps nbspa few years back the government of japan made

  Rrsp is currently valued at 200000 his asset allocation is

rrsp is currently valued at 200000. his asset allocation is 10 liquid 40 fixed income 50 equity. for every change in

  Suppose that microsoft is considering changing its capital

suppose that microsoft is considering changing its capital structure in light of the tough business environment.

  What the potentials what are the risks

What's the potentials? what are the risks.

  Uncertainty and decreasing profitability

AirWays Global, a US commercial airline, is experiencing marketing problems three years after 9/11. While the industry as a whole is on the path to recovery, after three years of uncertainty and decreasing profitability

  Identify a risky and a safe investment and provide

identify a risky and a safe investment and provide rationale to justify your choices. also discuss the trade-off of

  Risk factors invest in international vs domnesatic company

Risk Factors invest in International vs domnesatic company-Determine the most significant risk factors associated with investing in a foreign traded company as compared with investing in a domestic company

  Definition of an ibbotson and sinquefield investment

Which one of the following is a correct definition of an Ibbotson and Sinquefield investment category as used to report historical returns

  Way in which the malware was utilized to steal data

From the selected e-Activity article, describe in detail the way in which the malware was utilized to steal data or gain privileged remote access to a computer or network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd