Provides a clear statement of the it technology project

Assignment Help Other Subject
Reference no: EM131380375 , Length: word count:12000

Task

The final assessment for ITC 596 is to deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.

Senior executives in both business and technology divisions within Aztec have collected a portfolio of projects from their respective strategists that could be potentially funded for deployment. The portfolio includes projects such as:

  • Allowing employees to bring their own devices (laptops, tablets and mobile phones for example) into the workplace to be used as their main or sole devices in achieving their work tasks.
  • Migrating business-critical applications and their associated data sources to an external Cloud hosting solution.
  • Outsourcing key IT functionality such as the network, desktop management or application development to a third party.
  • Upgrading or introducing a major technology such as mobile platforms and applications, migrating to an improved networking technology (such as IPv6), creating a corporate-wide email archive for compliance purposes, or upgrading applications and desktop operating systems.

Each of these potential projects carries significant IT risks which will need to be managed to support the business case as to whether the project should go forward. In this case study, you are the IT Risk Assessment lead at Aztek, and your role is to be the interface between business stakeholders and technologists, translating potential technical difficulties into risk language to facilitate effective decision-making by stakeholders.

For the Aztek case study you will need to select one of the projects from the list above for a thorough IT Risk Assessment. You may select another project beyond those listed above with the approval of the subject coordinator, and you may wish to select a project that is relevant to your workplace for example.

Your deliverable for this ITC 596 Case Study is an IT Risk Assessment report, written for the intended audience of Aztek management providing a risk assessment of the project you have selected to consider.

Your report must be a Microsoft Word document, 15 - 25 pages in length at 12 point font and single spacing. The report must address the following criteria:

  • An Executive Summary at the beginning of the report which provides a clear statement of the IT technology project that is being assessed, and an overview of your recommendations to Aztek management as to the merits of the project based on your risk assessment (2 - 3 pages in length).
  • A review of the project with respect to the Financial Services sector, which would include any relevant government or industry regulation or compliance, and any established best practices (2 - 3 pages in length).
  • A review of the project impact on the current security posture of Aztec, as expressed by its current maturity against IT Security policies and procedures (3 - 5 pages in length).
  • A risk assessment based on threats, vulnerabilities and consequences derived from an IT control framework and any existing industry risk recommendations for the project. For example, there are several consortia for Cloud Computing that have created IT Risk Assessments for this technology (4 - 10 pages in length).
  • Specially address risks for Data Security from the viewpoint in the project of what data will be used, who will have access to the data and where will the data flow (2 - 4 pages in length).

Rationale

This assignment is for students to meet the following learning outcomes.

  • be able to justify the goals and various key terms used in risk management and assess IT risk in business terms;
  • be able to apply both quantitative and qualitative risk management approaches and to compare and contrast the advantages of each approach;
  • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk;
  • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Reference no: EM131380375

Questions Cloud

Summarize the crucial steps involved in conducting a trial : When looking at cases within the legal system, there is a process to follow leading up to discovery. There is so much to do in the Discovery process. Each side gets to ask questions and investigate the claim and find out things needed to determ..
Describe the characteristics of cereals within the cluster : Using all of the variables, except name and rating, run the k-means algorithm with k=5 to identify clusters within the data.
Determine relationship between fahrenheit and celsius temp : You know that 32 degrees Fahrenheit is equivalent to 0 degrees Celsius, and that 212 degrees Fahrenheit is equivalent to 100 degrees Celsius. Use the trend curve to determine the relationship between Fahrenheit and Celsius temperatures.
Increasing the tax on cigarettes : A MN legislator proposes that increasing the tax on cigarettes from $1 per pack to $2 per pack. Our legislator believes this tax increase is justified because of the health risks from cigarettes. Is this tax increase economically justified? Explain c..
Provides a clear statement of the it technology project : Your report must be a Microsoft Word document, 15 - 25 pages in length at 12 point font and single spacing. The report must address the following criteria: An Executive Summary at the beginning of the report which provides a clear statement of the..
The bicycle company uses the steel to produce bicycle : One bag of flour is sold for $1.00 to a bakery, which uses the flour to bake bread that is sold for $3.00 to consumers. Taking these three transactions into account, what is the effect on GDP? A steel company sells some steel to a bicycle company for..
Create a risk-free hedge portfolio can be created : FIN510- Determine two to three methods of using stocks and options to create a risk-free hedge portfolio can be created. Support your answer with examples of these methods being used to create a risk-free hedge portfolio.
Why does pseudo-f statistic have the word pseudo in its name : Should the analyst always choose the cluster solution with the better mean silhouette value? Explain.
How do issues in corrections correlate with the topic : You have been asked to participate in a local radio program to address the role of corrections in the community. The audience is specifically interested in discussing whether corrections should be focused on one or all of the following functions:R..

Reviews

len1380375

2/2/2017 2:10:22 AM

Completeness, purpose, meaning, formatting, grammar The report addresses all the stated sections in detail, with a common meaning and purpose flowing through the sections, leading to an authoritative conclusion, in a well-formatted document written without grammatical errors. Assignments are required to be submitted in either Word format (.doc, or .docx), Open Office format (.odf), Rich Text File format (.rtf) or .pdf format. Each assignment must be submitted as a single document. Assignments should be typed using 10 or 12 point font. APA referencing style should be used. A reference list should be included with each assessment item. All diagrams that are required should be inserted into the document in the appropriate position. Diagrams that are submitted in addition to the assignment document will not be marked.

Write a Review

 

Other Subject Questions & Answers

  Gain from cross-cultural research on marriage

Do people living in modern industrial society have something to gain from cross-cultural research on marriage?(please keep it short and simple)

  Intervention techniques or approaches

Can someone help with a description of two intervention techniques or approaches (Behavioral Couple Therapy, Emotionally focused Couple Therapy, Integrative Problem-Centered Couple Therapy, and Imago Relationship Therapy

  Communication and diversity

Determine one thing you could do to improve your own communication with others with regard to diversity. It doesn't have to be just using derogatory words toward particular racial, socioeconomic, or gender groups.

  Explain this philosopher''s view as it compares to your view

Thus the world must be recognized, from one aspect at least, as akin to a dream, indeed as capable of being put in the same class with a dream.

  Explain why publicity is important to terrorism

Explain why publicity is important to terrorism. Format your presentation consistent with APA guidelines.

  Differential effects of a body image exposure session

Read the article "Differential Effects of a Body Image Exposure Session on Smoking Urge Between Physically Active and Sedentary Female Smokers,"and identify the research questions and/or hypotheses as they are stated.

  What is idealism

The Greek philosopher Plato is credited with developing the doctrine of Idealism. What is idealism? How does idealism relate to the concept of mind?

  Explain the basic elements of an ems audit process

Explain the basic elements of an EMS audit process that can be applied to the Brazilian chemical industries. Suggest any improvements in the process for better auditing

  Why ethical standards are important for client progress

Identify the ethical standards of the APA or ACA code specific to Janice's concerns that the counselor should follow to provide professional and ethical services. Identify specific sections of the ethical code, described in your own words, which ma..

  Write down a 3-5 page paper explaining your understanding

write a 3-5 page paper demonstrating your understanding of organized crime in japan china russia and mexico. in your

  Analysis of the democratic concept or principle

An analysis of the democratic concept or principle represented in the Declaration of Independence and/or the Constitution you selected for this Discussion and an explanation of why you selected it. Explain how the concept or principle might be use..

  Price skimming-penetration pricing and status quo pricing

Companies utilize price skimming, penetration pricing, and status quo pricing. What companies use each of these strategies and which one is most effective and why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd