What is the first step in performing risk management

Assignment Help Computer Engineering
Reference no: EM131192167

Assignment: Defining the Scope and Structure for an IT Risk Management Plan

Overview

In this lab, you defined the purpose of an IT risk management plan, you defined the scope for an IT risk management plan that encompasses the seven domains of a typical IT infrastructure, you related the risks, threats, and vulnerabilities to the plan, and you created an IT risk management plan outline that incorporates the five major parts of an IT risk management process.

Lab Assessment Questions & Answers

1. What is the goal or objective of an IT risk management plan?

2. What are the five fundamental components of an IT risk management plan?

3. Define what risk planning is.

4. What is the first step in performing risk management?

5. What is the exercise called when you are trying to gauge how significant a risk is?

6. What practice helps address a risk?

7. What ongoing practice helps track risk in real time?

8. True or False: Once a company completes all risk management steps (identification, assessment, response, and monitoring), the task is done.

9. Given that an IT risk management plan can be large in scope, why is it a good idea to develop a risk management plan team?

10. In the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, treat, and monitor?

11. Which compliance laws or standards does the health care organization mentioned in the Hands- On Steps have to comply with (consider these: Health Insurance Portability and Accountability Act [HIPAA], Gramm-Leach-Bliley Act [GLBA], and Family Educational Rights and Privacy Act [FERPA])? How does this impact the scope and boundary of its IT risk management plan?

12. How did the risk identification and risk assessment of the identified risks, threats, and vulnerabilities contribute to your IT risk management plan outline?

13. What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability?

14. For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastructure to help mitigate risk?

15. For risk mitigation, what processes and procedures can help streamline and implement risk- mitigation solutions to the production IT infrastructure?

16. What is the purpose of a risk register?

17. How does risk response impact change control management and vulnerability management?

Reference no: EM131192167

Questions Cloud

Matter are present inside the container : A 50.0 g piece of CO2(s) (i.e. "dry ice") is sealed inside a0.250 L container held at 20°C. Based on the phase diagram of CO2(Figure 11.42 in the textbook), what state(s) of matter are present inside the container?
How was your professional work impacted by the stressor : In this portion of the paper, you should provide information from the textbook and an additional source identified from the CSU Library to analyze the impact that the stressful event could have placed upon your health, future goals, and motivation..
Supply chain management is the purchasing strategy : One of the most strategic decisions facing a company in supply chain management is the purchasing strategy. In most industries, cost of raw materials and procured components consume a significant portion of the company's budget.
Deployment services and the windows automated installation : For a highly virtualized data center, how does this change the deployment options available from traditional data centers? Is there any benefit or need in using some of the traditional deployment options (e.g., disk imaging using software like Gho..
What is the first step in performing risk management : What is the first step in performing risk management? What is the exercise called when you are trying to gauge how significant a risk is? What practice helps address a risk? What ongoing practice helps track risk in real time?
Biggest dangers of bring your own device : What do you think are the biggest dangers of bring your own device (BYOD)? What are the best ways for a company to protect against this threat? Justify your answer
Prevalent mobile computing limitations : What do you think are the most prevalent mobile computing limitations? Justify your answer
Information assurance capstone : 1. In the connection of data preparing, PC security and trusted frameworks, clarify what is implied by the accompanying terms and why we need to utilize them:
Prepare a tender for the installation of steel street lamps : Prepare a tender/estimate for the installation of 20 steel street lamps in 5 streets of a small town to replace ageing concrete lamp standards

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  What is the expected access time

Given a 64-byte cache block, a 512 KB fully associative cache (assume byte-addressable), and a 32 bit address reference, which bits could be used for tag, index, and offset.

  Create a crontab file that will regularly perform backups

Create a crontab file that will regularly perform the following backups.

  Make draft or a excel spreadsheet of java vs. c++

want a draft or a excel spreadsheet of Java vs. C++ and its comparisons. I want bold statements and strong related bold information.

  What kinds of change efforts are going on in your

organizations undergo planned or unplanned changes to evolve to a newer and better level in their life cycle. these

  Information systems typically support different work

information systems typically support different work models. you have been asked to create a report on what work

  Mux design the function

MUX design the function F(A,B,C) = (POS) (0,1,2,3,5,7,). The MUX has an active low strobe input.

  Question1 provide an executive overview that addresses as

question1. provide an executive overview that addresses as following-describe the benefits and current trends of data

  Compute and print the average power output

Compute and print the average power output over this 10-week period. Print the number of days with greater-than-average power output.Also print the day of the week and the number of the week on which the output is greater-than-average.

  Program that help an elementary school learn multiplication

Computers are playing an increasing role in education. Write a program that will help an elementary school learn multiplication. make Use of a Random object to produce two positive one-digit integers.

  Create an array of pointers to objects of class real estate

A file should be used to store the data once all of the objects are created. There should be 5 objects in the real estate program.

  Design a class box that defines a box on a floor

You will Design a class box that defines a box on a floor. A box has a number and an (a,b) location where a and b are numbers between -5, and 5. The key member function is plot, which plots the box.

  Knowledge revolution and industrial revolution

What are your thought on this that would support notion that Knowledge Revolution was born from the Industrial Revolution?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd