Inventory all your computer equipment

Assignment Help Computer Engineering
Reference no: EM131225546

Module Risk Assessment Report

In order to determine the assets and resources that most need protecting with available funding, a risk assessment must be completed.

In order to successfully complete this assignment:

1. Inventory all your computer equipment. (Include printers, scanners, monitors, iPads, smart phones, keyboards, etc. EVERYTHING)

2. Inventory all your software.

3. Inventory all data saved on all your devices. Some examples are:

a. Contacts
b. School files (homework, papers, etc)
c. Tax documents
d. Banking information
e. Photos
f. Music and movies
g. Any other files/data

4. In a Word document, list the data collected in numbers 1-3. Make a section for each. (e.g. Hardware would be one section.)

5. Decide which of the items are most important to you. In other words, which ones would cause the most grief, pain, aggravation or money if lost?

6. Decide which items you can easily replace. This can mean the least inexpensive to replace or those than can easily be recreated.

7. In the Word document with the inventory, create another section titled "Assessment". In this section describe which items are most important to you and why. Also, describe the items mostly easily replaced and why. Sometimes the most important are part of the easiest to replace. For example; a smartphone may be the most important but also the easiest to replace because it is insured.

8. Create a section in the same document titled "Priorities". In this section, list in order of priority the items that you feel you should apply the most stringent security measures.

This exercise will assist you in completing the risk assessment for the final project. In this exercise it assumed that money is not an object when it comes to protecting IT assets. In the final project, the same assumption holds. Note that in the real world, budget plays a major role in determining security measures.

Reference no: EM131225546

Questions Cloud

Calls per day required by sales force to break even : If they have an average revenue of $70 per sale and they only sellone in five customers, what would be the required sales level, number of sales and calls per day required by the sales force to break even?
Write a cpp program to find fibonacci numbers : Only one program, Write a C++ Program to Find Fibonacci Numbers using Dynamic Programming.
Calculate the market value-weighted index value : 1. What happened for stock C during this period? 2. Calculate the price-weighted index value at time 0 and at time 1 assume the divisor for time 1 is 2.35. 3. What is the rate of return if you use price-weighted method? 4. Calculate the market value-..
What is the present worth of the annual disbursements : The maintenance costs associated with a machine are $2,000 per year for the first ten years, and $1,000 per year thereafter. The machine has an infinite life.
Inventory all your computer equipment : Create a section in the same document titled "Priorities". Inventory all your computer equipment. (Include printers, scanners, monitors, iPads, smart phones, keyboards, etc. EVERYTHING)
Company equity multiplier : Norton Company has a debt-to-equity ratio of 1.18, ROA of 12.23 percent, and total equity of $1,484,000. What are the company's equity multiplier, debt ratio, and ROE? (Round answers to 2 decimal places, e.g. 12.55 or 12.55%.)
Inventory turnover ratio and days : Sorenson Inc. has sales of $4,056,000, a gross profit margin of 38.55 percent, and inventory of $1,139,000. What are the company's inventory turnover ratio and days' sales in inventory? (Round inventory turnover ratio to 3 decimal places, e.g. 12...
Return on the market portfolio : Assume that the risk-free rate is 3.8 percent. If a stock has a beta of 0.8 and a required rate of return of 11.5 percent, and the market is in equilibrium, what is the return on the market portfolio?
Expected return and standard deviation : What is the expected return and standard deviation on the companys stock?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write down a shell script to send a customized

Write down a shell script to send a customized mail message to the users listed on the command line by login (user) name, only if they are currently logged on. If no users are listed on the command line, an error message should be printed.

  What would you say to a vendor that tells you

What would you say to a vendor that tells you that his system runs 50% of the SPEC benchmark kernel programs twice as fast as the leading competitive system? Which statistical fallacy is at work here?

  There are multiple internet browsers available today and

there are multiple internet browsers available today and many people choose which to use without giving it

  The comma-separated values csv file format is a delimited

the comma-separated values csv file format is a delimited data format commonly used as a portable representation of

  Define how the lack of metrics for measuring

define how the lack of metrics for measuring certain software properties affects the software engineering discipline.

  Write an application that extends jframe and that displays

Add a JButton to the JSmileFace program so the smile changes to a frown when the user clicks the JButton. Save the file as JSmileFace2.java.

  Create a shippedorder class that derives from order

Create a ShippedOrder class that derives from Order.

  Create an original simple drawing using pencilcode

Create an original simple drawing using pencilcode. Use at least five different instructions to create your picture. Include for and a curve in your drawing.

  Rules of inference to show that the hypotheses

Use rules of inference to show that the hypotheses "If it does not rain or if it is not foggy, then the sailing race will be held and the lifesaving demonstration will go on,"

  Html and javascript

Write down the HTML and JavaScript: A 3x3 2D array: Arrays can have anything, even other arrays. In the JavaScript, 2D arrays are assigned with the single array, where each element consists of an array.

  Data representation and logic

Representing Text and Numbers, Binary Arithmetic, Interpreting Logical Statements, Logic Puzzle, Binary and Algorithms.

  Gantt chart-project log

Morris Wildlife Services deals with the humane removal of wildlife from places it does not belong (such as removing bats from attics and trapping coyotes for release in more suitable habitat).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd