Reference no: EM131225546
Module Risk Assessment Report
In order to determine the assets and resources that most need protecting with available funding, a risk assessment must be completed.
In order to successfully complete this assignment:
1. Inventory all your computer equipment. (Include printers, scanners, monitors, iPads, smart phones, keyboards, etc. EVERYTHING)
2. Inventory all your software.
3. Inventory all data saved on all your devices. Some examples are:
a. Contacts
b. School files (homework, papers, etc)
c. Tax documents
d. Banking information
e. Photos
f. Music and movies
g. Any other files/data
4. In a Word document, list the data collected in numbers 1-3. Make a section for each. (e.g. Hardware would be one section.)
5. Decide which of the items are most important to you. In other words, which ones would cause the most grief, pain, aggravation or money if lost?
6. Decide which items you can easily replace. This can mean the least inexpensive to replace or those than can easily be recreated.
7. In the Word document with the inventory, create another section titled "Assessment". In this section describe which items are most important to you and why. Also, describe the items mostly easily replaced and why. Sometimes the most important are part of the easiest to replace. For example; a smartphone may be the most important but also the easiest to replace because it is insured.
8. Create a section in the same document titled "Priorities". In this section, list in order of priority the items that you feel you should apply the most stringent security measures.
This exercise will assist you in completing the risk assessment for the final project. In this exercise it assumed that money is not an object when it comes to protecting IT assets. In the final project, the same assumption holds. Note that in the real world, budget plays a major role in determining security measures.
Calls per day required by sales force to break even
: If they have an average revenue of $70 per sale and they only sellone in five customers, what would be the required sales level, number of sales and calls per day required by the sales force to break even?
|
Write a cpp program to find fibonacci numbers
: Only one program, Write a C++ Program to Find Fibonacci Numbers using Dynamic Programming.
|
Calculate the market value-weighted index value
: 1. What happened for stock C during this period? 2. Calculate the price-weighted index value at time 0 and at time 1 assume the divisor for time 1 is 2.35. 3. What is the rate of return if you use price-weighted method? 4. Calculate the market value-..
|
What is the present worth of the annual disbursements
: The maintenance costs associated with a machine are $2,000 per year for the first ten years, and $1,000 per year thereafter. The machine has an infinite life.
|
Inventory all your computer equipment
: Create a section in the same document titled "Priorities". Inventory all your computer equipment. (Include printers, scanners, monitors, iPads, smart phones, keyboards, etc. EVERYTHING)
|
Company equity multiplier
: Norton Company has a debt-to-equity ratio of 1.18, ROA of 12.23 percent, and total equity of $1,484,000. What are the company's equity multiplier, debt ratio, and ROE? (Round answers to 2 decimal places, e.g. 12.55 or 12.55%.)
|
Inventory turnover ratio and days
: Sorenson Inc. has sales of $4,056,000, a gross profit margin of 38.55 percent, and inventory of $1,139,000. What are the company's inventory turnover ratio and days' sales in inventory? (Round inventory turnover ratio to 3 decimal places, e.g. 12...
|
Return on the market portfolio
: Assume that the risk-free rate is 3.8 percent. If a stock has a beta of 0.8 and a required rate of return of 11.5 percent, and the market is in equilibrium, what is the return on the market portfolio?
|
Expected return and standard deviation
: What is the expected return and standard deviation on the companys stock?
|