Identifying potential risk-response and recovery

Assignment Help Business Management
Reference no: EM131279721

Identifying Potential Risk, Response, and Recovery

APA FORMAT CITE REFERENCES

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

  1. For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.
  2. For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.
  3. Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.
  4. Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).
  5. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required page length. 

The specific course learning outcomes associated with this assignment are:

  • Explain the concepts of information systems security as applied to an IT infrastructure.
  • Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131279721

Questions Cloud

How do investors gauge the default risk of a bond issue : How do investors gauge the default risk of a bond issue?- Why is the maturity of an amortizing bond not a useful measure?
Exceed the total number of stations in a line : Can the critical WIP exceed the total number of stations in a line? Can critical WIP exceed the total number of machines in a line? Clearly explain the logic behind your answers.
Determine the manometer reading h : Oil of SG 0.87 and a kinematic viscosity v = 2.2 × 10-4 m3 /s. flows through the vertical pipe shown in Fig. P8.25 at a rate of 4 × 10-4 m3 /s. Determine the manometer reading, h.
Why is the cash flow of a residential mortgage loan unknown : What is the difference between a municipal tax-backed bond and a municipal revenue bond?- Why is the cash flow of a residential mortgage loan unknown?
Identifying potential risk-response and recovery : In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potent..
What are contraction risk and extension risk : Why is an assumed prepayment speed necessary to project the cash flow of a mortgage pass through security?-  What is meant by prepayment risk for a residential mortgage-backed security?
Essay on a designer name eero saarinen and her womb chair : Write an essay about a designer name Eero saarinen and her womb chair. The essay will consist of tree paragraghs, each containing five sentences.
Who determines the amount of credit enhancement needed : Why is it necessary for a nonagency mortgage-backed security to have credit enhancement?- Who determines the amount of credit enhancement needed?
Importance of effective change leadership : Investigate the importance of effective change leadership in relation to an organization's adoption of social media initiatives. Next, suggest two (2) ethical issues that a CIO may encounter when implementing social media initiatives. Propose (1) ..

Reviews

Write a Review

Business Management Questions & Answers

  Demand for the product in the future

For this assignment, you will identify 3 subjective, qualitative factors to consider. Once you have explained each select the one out of the three options listed that you recommend most. What factors may affect the demand for the product in the fu..

  Explain compensation expense for the value

Carmen as well as Carlos form White Corporation. Carmen transfers cash of $100000 for 100 shares in White. Carlos transfers property (basis of $20000 and fair market value of $80000) as well as agrees to serve as manager of White Corporation for o..

  Information for action research projects

Compare and contrast two methods of gathering information for action research projects. What are the strengths and weaknesses of these different approaches?

  Explain how would you defend the use of swot analysis

Explain How would you defend the use of SWOT analysis for starting off your project

  Trade-off theory and stock dividend1 since debt financing

trade-off theory and stock dividend1. since debt financing raises the firms financial risk raising a companys debt

  What are the principal arguments supporting free trade

Describe how free trade works (ideally). In the discussion, be sure to address barriers to free trade associated with protectionist policies and what are the principal arguments supporting free trade?

  Functions of financial managementdescribe what the two

functions of financial managementdescribe what the two functions of financial management are. identify and define the

  Developing and managing productsyou are a marketing manager

developing and managing productsyou are a marketing manager for nike. your department has come up with the idea of

  Competing in foreign marketswhich of the following is not a

competing in foreign marketswhich of the following is not a reason why crafting a strategy to compete in one or more

  Different types of organizations

Choose three project knowledge areas, and consider how the project might be affected in each of these areas by the different types of organizations behind the project. Write a few paragraphs on this topic to organize your thoughts on the subject.

  Encourage and support the implementation of innovations

Identify some of the significant challenges you believe you might face when it comes to suggesting and seeing innovations through in the organizations in which you are or may be involved?

  Case study dave armstrongdave armstrong is the disguised

case study dave armstrongdave armstrong is the disguised name of the 29-year old second year mba student who wrote this

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd