Concepts of information systems security as applied to an it

Assignment Help Computer Network Security
Reference no: EM13872078

a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.
For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Explain the concepts of information systems security as applied to an IT infrastructure.

Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

Use technology and information resources to research issues in information systems security.

Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions

Reference no: EM13872078

Questions Cloud

Boat and dropped in the pool : The boat in the water holds an iron anchor which is removed from the boat and placed on the shore. The iron anchor is removed from the boat and dropped in the pool.
Scale on the vertical axis : A small solid ball is released from rest while fully submerged in a liquid and then its kinetic energy is measured when it has moved 4.0 cm in the liquid. Figure gives the results after many liquids are used: The kinetic energy K is plotted versus..
Implementations of routing protocols : implementations of routing protocols
What are the perfect financial market assumptions : What are the perfect financial market assumptions? What is their implication for multinational financial management?
Concepts of information systems security as applied to an it : concepts of information systems security as applied to an IT infrastructure
How mncs reduce operating expenses relative to domestic firm : What investment opportunities might MNCs enjoy that are not available to local firms? How can MNCs reduce operating expenses relative to domestic firms?
How much will you pay over the life of each loan : How much will you pay over the life of each loan? How much of that is interest - which option would you choose? Explain your reasoning, taking into account your answers to both (1) and (2).
Explain how this impacted other levels of the organization : Explain how this impacted other levels of the organization
What is the critical path and why is it so important : What is the critical path and why is it so important for project manager

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security administrator of a major organization

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

  Result is the theft or misuse of confidential information

what is a security incident?a security incident in an organization is a serious event that can occur at any point from

  Experiences with the social networking sites

Your experiences with the social networking sites like Craig list etc etc and Why do you think social networking sites are so popular? In other words, what is their stickiness?

  Limits of information privacy

Question 1: Does the governments have the right to go our information privacy? Question 2: What is the limits of information privacy?

  What is the cia triad

1.What is the CIA Triad, and how is it relevant in the context of systems software? 2.Explain the concept of Red vs. Blue as it pertains to software testing.

  Security weaknesses

In this phase you will choose either Aircraft Solutions or Quality Web Design as the company you will work with. You will then identify potential security weaknesses

  Design a secure authentication technology for gfi

Identify and describe the organizational authentication technology and network security issues. Make a list of access points internal and external (remote). Design a secure authentication technology and network security for GFI

  Implementing and managing an information security

Develop a list of at least five (5) best practices for implementing and managing an information security governance program within an organization

  Decision on it security investments

Discuss whether true unity is technically possible and why or why not If true unity is not technically possible, how should budgeters and policy-makers be guided to make the correct decision on IT Security investments?

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  Examine the contents of the security and privacy tabs

Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd