Analyze differences between type of threat and vulnerability

Assignment Help Management Information Sys
Reference no: EM131132041

Assignment: IT Risk Analyzing Personal and Business Vulnerabilities

Large organizations are not the one ones susceptible to threats of potential privacy and data security breaches. Individuals are also prone to vulnerabilities that may result in attacks and identity theft. The evoluation of the Internet has resulted in an exponential growth in exploits, malware, and other types of attacks for both individuals and for e-Commerce. Imagine that you are an IT professional and Web application developer for a retail company. Part of your job entails anticipating potential risks and develop strategies to mitigate them.

Write a three to five page paper in which you:

1. Explain the major effects that the advancement of technology has provided to businesses in relation to opportunities for more efficiency, collaboration, and distributed resources. Note: Be sure to include how the security landscape has changed.

2. Analyze the major differences between the types of threats and vulnerabilities that exist between personal use and business use of the Internet.

3. Suggest two ways that you would incorporate perimeter defense into a risk management plan.

4. Your retail organization has decided to do internal Web hosting. Assume that your Website is mission critical. Speculate on the top five (5) anticipated Website attack risks. Provide specific mitigation strategies to address each risk.

5. Use at least four quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.

6. Format your assignment according to the following formatting requirements:

a. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
b. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.
c. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

Reference no: EM131132041

Questions Cloud

Identify each statement as true or false : The transfer of stock from one owner to another requires the approval of either the corporation or other stockholders.
Show the internal state of the array : Use the QuickSort algorithm to rearrange the array. Clearly show the internal state of the array after each pass of the sorting process.
Define importance of master budget to success of hr function : Comment on why each budget piece must be created in that specific order. For example, why does the sales budget have to come before the production budget?
Why does an increase in the ratio of current assets to total : Why does an increase in the ratio of current assets to total assets decrease both profits and risk as measured by net working capital? How do changes in the ratio of current liabilities to total assets affect profitability and risk?
Analyze differences between type of threat and vulnerability : Analyze the major differences between the types of threats and vulnerabilities that exist between personal use and business use of the Internet.
What is net working capital : Why is short-term financial management one of the most important and time-consuming activities of the financial manager? What is net working capital?
The paid in capital in excess of par value on the preferred : Connolly Corporation has issued 100,000 shares of $5 par value common stock. It authorized 500,000 shares. The paid-in capital in excess of par value on the common stock is $240,000.
What problem might occur with the full implementation of rfi : What problem might occur with the full implementation of RFID) technology in retail industries? Specifically, consider the amount of data chat might be collected.
Identify how to sustain good performance levels : Prepare two development plans (one for the mailroom specialist who accepted the package and one for the administrative assistant who delivered it to the mailroom). Ensure that each employee development plan is in line with the direction of the com..

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are the best five practices in the areas of technology

what are the best five practices in the areas of technology risk management?about 300 words no references. otas opinion

  Supply chain management powerpointafter the initial report

supply chain management powerpointafter the initial report the owners of stone horse supply company john and michael

  Create an implementation plan for your organization

Create an implementation plan for your organization, one of the Virtual Organizations, or a project from the websites such as challenge.gov or a state RFP site. Obtain instructor approval of the plan before beginning

  Human factor in technologywhat is understand by the human

human factor in technologywhat is understand by the human factor and why is this important in considering the impact of

  Skills for a technology manager

Skills for a technology manager and What are some of the skills you think a technology manager should have?

  Current technology assessment cosmetics companyi need to

current technology assessment cosmetics companyi need to identify the technology used in a cosmetics company. describe

  Creating a systems development planefficient use of

creating a systems development planefficient use of datacompany success is related to efficient use of its data? what

  Explain how social media is different

Based on what you have learned about using social media in today's enterprises, prepare a 5-slide presentation to a department head or the CEO of a company to convince the audience that this would benefit their business.

  Discuss the legal environment

As part of your first consulting assignment, you have been asked to research and write a short case study (three pages) in which you discuss the legal environment (i.e., policies, regulations, and laws)

  Explain what management strategies may be adopted

In addition to technical instruments, what management strategies may be adopted in order to prevent employees from compromising information security?

  Analyse information security vulnerabilities

analyse information security vulnerabilities and threats and determine appropriate controls that can be applied to mitigate the potential risks

  Compare and contrast the different vendors

Compare and contrast the three different vendors

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd