Analyse the various approaches for mitigating security risk

Assignment Help Management Information Sys
Reference no: EM131299678

Assessment Task -

Specific issues that you need to address in the forum discussions are provided within the first 3 topics.

These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts.

As this is a postgraduate course. it is expected that your written responses will provide you an opportunity to express your personal and professional views. There are no correct answers, however the way you justify your answers with validated evidence is key to this activity.

Post your forum entries as you are prompted within the topics. Your Subject Coordinator will respond to your first forum post and monitor and moderate as required the remaining 2 posts.

You must curate, collect and save your responses in a word document to be submitted on EASTs. This activity's final mark will be provided prior to the final assessment item.

Rationale

As this is a graduate course, more is expected from students in the way of participation, and further as a graduate reading course, the opinions of students are actively sought to demonstrate that the reading material has been read, understood and provoked a response. The readings on a given topic will in general not agree on all issues in the topic, such as the role and feasibility of cyber-insurance, and soliciting written responses from students gives an opportunity for expressing opinions from the professional experience of each student. Also being a distance course, regular posting on the forum promotes the cohesion of the cohort and a notion of group learning for this course. This assignment is for students to meet parts of the following learning outcomes.

  • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk:
  • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Textbook - Inside the Security Mind Making the Tough Decisions by Kevin Day.

Reference no: EM131299678

Questions Cloud

Mcdonalds tracking survey presented in branding brief : Consider the McDonald's tracking survey presented in Branding Brief. What might you do differently? What questions would you change or drop?
Draw entity relationship diagram of state tennessee tn : Draw Entity Relationship Diagram (ERD) of state Tennessee TN. You could also list, for example, top five hospitals, or the bottom five percent. Set "Top Values" property on the property sheet in the Query Design screen.
Employ projective techniques to attempt to identify sources : Pick a brand. Employ projective techniques to attempt to identify sources of its brand equity. Which measures work best? Why?
Can you profile the brand personalities of the leading brand : Can you profile the brand personalities of the leading brands in the category using Aaker's brand personality inventory?
Analyse the various approaches for mitigating security risk : Specific issues that you need to address in the forum discussions are provided within the first 3 topics. Be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk
Conduct a branded and unbranded experiment : Choose a product. Conduct a branded and unbranded experiment.- What do you learn about the equity of the brands in that product class?
Does the firm appear to have an agency problem : Evaluate the firm's approach to pollution control. Does it seem to be ethical? Why might incurring the expense to control pollution be in the best interests of the firm's owners despite its negative effect on profits?
What do you think of the interbrand methodology : How do you think Young & Rubicam's Brand Asset Valuator relates to the Interbrand methodology? What do you see as its main advantages and disadvantages?
Images or diagram of sample products : For your midterm project complete the following using screenshots, images or diagram of sample products, processes, etc. to illustrate and descriptive texts to address the items below (you may also consult YouTube.com as a source) This is not a re..

Reviews

len1299678

12/3/2016 6:34:00 AM

In this you will have to select any 3 topics from it book which I will email you and Go to topic one which is book. Look at the index chapters and topics will b there select any three topics from it write down 500 words on each topic with APA reference style as well as in text referencing need all three in same word file. Here I have attached book for itc subject for assignment 1 from that you will have to choose any 3 topics and writer down 500 words on each topic in one word file with apa6 reference style list as well as in text referencing.

Write a Review

Management Information Sys Questions & Answers

  Dividends or stock appreciation

Describe why certain shareholders would have a preference on receiving dividends and on the amount of the dividend. If you were a shareholder of Apple, what would you prefer: dividends or stock appreciation? Please explain your reasons.

  How it is possible for someone at minitrex to call customer

Explain how it is possible for someone at Minitrex to call a customer and not know (a) that this is a customer and (b) that this is the third time this week that they had been called?

  Stretegic alliance agreements

Are supply chain management and the establishment of strategic alliance agreements with select suppliers more conducive to private sector organizations

  Management information systems written reporta

management information systems written reporta problem-solving approach to case analysis will be introduced in class.

  Applications for businesses and individual users

Location Based Application, SDLC, Powerpoint and What are the benefits and drawbacks of location-based applications for businesses and individual users?

  Comparisons and functions of mdm software

Functions and Comparisons of MDM Software - Evaluate which of the three would work best for your organization and explain why you think it would be the best choice.

  How statistics be misleading to a decision-maker

Why has risk modeling become pervasive in the security management professions? Why do you believe that MSRAM has become a favored Risk Management tool? Just because it was first?

  Design of data input screens and report and queries produced

Designs of data input screens and reports and queries produced. A brief description of how the system is operated and the commands used to undertake each task.

  Cultural perpsective on legal and ethics in

cultural perpsective on legal and ethics in manufacturingfrom what weve seen lately might chinese manufacturers have a

  How widespread use of mcommerce technology could affect life

How the widespread use of m-commerce technologies could affect your life? A comprehensive evaluation of the components that are associated with M-Commerce.

  Evaluate collaboration technologies such as cisco webex

Virtual Meeting Tech could evaluate collaboration technologies such as Cisco Webex, which is a feature laden virtual business meeting tool

  Define and explain what the strategic technology is

Provide a definition of the term ENTERPRISE as it relates to technology. Select one of the top strategic technologies in the article and then conduct some research on it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd