Explain in detail why you believe the risk management

Assignment Help Other Subject
Reference no: EM131408707 , Length: 5

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Explain the concepts of information systems security as applied to an IT infrastructure.

Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

Use technology and information resources to research issues in information systems security.

Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Attachment:- malware_done.rar

Reference no: EM131408707

Questions Cloud

How many different proteins : How many different proteins, 15 amino acid long, could you make given an unlimited number of each of the 20 amino acids? Most real proteins are actually in the range of 300 amino acids long. How many different possible proteins, 300 amino acids i..
Identify two products whose demand is price elastic : Identify 2 Products whose demand is price elastic and explain why. Which of the graphs for the best demonstrates the law of demand? Which of the following graphs best demonstrates the law of supply?
Statement we can make about the p value for the test : Using the appropriate statistical table, what is the most accurate statement we can make about the p-value for the test?
A guide to biology before beginning this lab : Please read Chapter 12 of What is Life? A Guide to Biology before beginning this lab. The purpose of this lab exercise is to demonstrate that plants are in our environment and there is diversity among these plants.
Explain in detail why you believe the risk management : A videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious att..
Identify the warehouse and markets : Consider Reformulate the production planning problem as a transportation model. Identify the warehouse and markets and set up the transportation table.
Write out the constraints and the objective function : Reformulate this problem as an LP model assuming that all backorders must be filled by the end of the 4th week. It is sufficient you define all the variables, write out the constraints and the objective function.
What is parametric counterpart to wilcoxon signed rank test : What is the parametric counterpart to the Wilcoxon signed rank test for paired samples? Compare the assumptions involved in using the respective tests.
Analyze economic theory used to complete the policy solution : Design an economic policy solution to the problem. Analyze the economic theory used to complete the policy solution and determine the impact on the appropriate stakeholders.

Reviews

Write a Review

Other Subject Questions & Answers

  Free expression or copyright piracy

Is the creating and uploading of vids to the Internet simply an ethical expression of one's free speech, or is it an infringement of intellectual property?

  Compare the movie thelma and louise

COMPARE or CONTRAST the movie Thelma and Louise and Easy Rider. Remember, you may NOT use the word freedom to compare these to films

  Interest groups in the formulation of public policy

Interest Groups in the Formulation of Public Policy

  Test publisher has developed the second edition

For example, if a test publisher has developed the second edition of an assessment, would it be appropriate for us to use the first edition. How do we know when it appropriate or not appropriate?

  What might be the outcome of a utilitarian analysis

Susan serves on the city building commission.  The city is planning to build a new subway system to extend the reach of the subway further out from the city center.  Susan’s cousin, Sam, owns Subway Mobility Co., submitted the lowest bid for the syst..

  Law of association

What law of association did Guthrie build his theory around? Describe this law and explain how the recency principle is deduced from it.

  Evaluate the self-help group you attended

Evaluate the self-help group you attended and/or researched. Critique the strengths and weaknesses of self-help groups in terms of their value in the treatment of substance abuse

  What are some suggestions for addressing the issue

What are some suggestions for addressing this issue? What is the role of nursing as it relates to the identified issue? Identify the source where you first learned about this topic.

  Discuss several risks associated with sleep deprivation

Why do sleep patterns and duration vary from person to person? What is sleep debt? Can you catch up? Search the internet for an answer to this one. Discuss several risks associated with sleep deprivation. Have you personally experienced any of thes..

  Regarding judgmental heuristics

Which of the following is true regarding judgmental heuristics?

  Analyse challenges in accounting facing the industry

Analyse challenges in Accounting facing the industry using quantitative and qualitative analytical tools - write a detailed analysis of the strengths and limitations of your entire project

  Biological and cognitive psychology

Biological and cognitive psychology have evolved from past to present and what direction it may take in the future. 4-5 power point slides with slides in which you discuss the topic you selected for your Biological and Cognitive Psychology Presentati..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd