Explain in detail why you believe the risk management

Assignment Help Basic Computer Science
Reference no: EM131000661

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

1 For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

2 For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

3 Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

4 Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

5 Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.

• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.

• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

• Use technology and information resources to research issues in information systems security.

 Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131000661

Questions Cloud

Display the characteristics of an animal : Include a brief documentation (in the code or in a separate document) to explain the input (if any), processing and output of the program
Compare your calculations for the two companies : Calculate the gross profit ratio, the inventory turnover ratio, and the average days in inventory for the two companies using the most recent fiscal year data.
Develop forecasts using a three-period moving average : The number of cans of soft drinks sold in a machine each week is recorded below. Develop forecasts using a three-period moving average
How can electromigration be used as property for separation : How can electromigration be used as property for separation?
Explain in detail why you believe the risk management : For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain yo..
Calculate the inventory value at the end of 2011 and 2012 : Calculate the inventory value at the end of 2011 and 2012 using the dollar-value LIFO method.
Proportion of the population in favor of the proposition : An opinion poll based on a sample of 50 subjects estimated p, the proportion of the population in favor of the proposition, as 0.72.
What are the three fundamental analysis strategies : Explain the role and interests of the project champion, organizational management, and end users regarding a new system project. How will each impact the organizational feasibility of the project?
Mercury company has only one inventory pool : Compute the inventory at December 31, 2012, 2013, and 2014, using the dollar-value LIFO method.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Which industrialization essentially made us less independent

Many experts assert which industrialization has essentially made us less independent and more closely related to other people than ever before.

  How does noise affect signals

How does noise affect signals? What happens if the level of noise becomes too high relative to the strength of the signal?

  Explaining service strategy or service design

Select a topic that most interests you from Service Strategy or Service Design and then write a paper around that topic. Try to use as much of your own creativity and originality when writing the paper.

  What are some of most important technological innovations

What are some of the most important technological innovations of the past year?

  Method in phone charger class

Which of the following would be a more appropriate choice for a method in a PhoneCharger class

  Identify the functional dependencies between the attributes

Present the attributes organized into 3NF relations that have been named appropriately.

  A common theme emerging from the group postings?

Is there a common theme emerging from the group postings?

  Include the terms iterative and recursive query

Describe the process a client would perform to resolve the name yahoo.com. Assume that the full DNS names resolution process must be performed. Include the terms iterative and recursive query

  Impact of activities called ping sweeps and port scans

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what the impact of these activities might be on your company.

  Create a new query named

Create a new query named: GreenhouseTechsFT. Add all the fields from the Employees table. The query should list all employees whose Position contains the word greenhouse and whose weekly hours are greater than or equal to 30

  List best practices in staffing future organizational needs

Having staff with the proper skill sets is immensely important to accomplishing corporate objectives. List and support three best practices in staffing future organizational needs.

  Performance of computer if main memory speed remains same

Using a faster processor chip result in corresponding increase in performance of computer even if main memory speed remains the same.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd