Create a list of information security vulnerabilities

Assignment Help Management Information Sys
Reference no: EM131205339

Select an organization that you are familiar with or an organization from a published case study.

Find case studies through the following sources or through a faculty-approved source. Suggestions are as follows:

Search within University Library for these periodicals
Information Week
CSO
SC Magazine

The CEO of your selected organization has requested an enterprise security plan from your team. The first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This list should be fairly exhaustive. Many vulnerability and threat pairs will not make the final cut for remediation, but an organization can only properly prioritize these if it has fully covered all of the risks.

Create a list of 30 information security vulnerabilities with related threats relevant to the organization. Keep in mind:

Most vulnerabilities will have more than one related threat.

Cover both physical and logical vulnerabilities.

Place your list in the first two columns of a table in a Microsoft Word or Excel document. The table will resemble the following:

Vulnerability

Threat

Probability

Impact

Suggested Mitigation Steps

 

 

 

 

 

 

 

 

 

 

 Include at least 15 vulnerabilities in your list involving physical security and at least 15 involving logical security.

Note: The other three columns will be used next week. Each row in the table should be a specific vulnerability with a related threat, though it is most likely that some vulnerabilities will have more than one possible threat in the table.

Reference no: EM131205339

Questions Cloud

Identity gaps in nursing knowledge : Identity gaps in nursing knowledge - Determine the need to refine or clarify a concept (a phenomenon of interest); clarify the meaning of terms.
Uses the aging of accounts receivable method : Friedman Company uses the aging of accounts receivable method. Its estimate of uncollectible receivables resulting from the aging analysis equals $26,000. The unadjusted credit balance in the Allowance for Doubtful Accounts account is $8,400 What is ..
Draw dependency diagram to show the functional dependencies : Draw a dependency diagram to show the functional dependencies that exist in this relation - Decompose the Home Library relation into a set of 3NF relations and draw a dependency diagram for each of the 3NF relations.
Prepare classified balance sheet in report form : The following information was obtained from the accounts of Lukes, Inc., as of December 31, 2012. It is presented in scrambled order. Prepare a classified balance sheet in report form. For assets, use the classifications of current assets, plant and ..
Create a list of information security vulnerabilities : The CEO of your selected organization has requested an enterprise security plan from your team. The first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This lis..
Define a collective choice procedure as satisfying : Define a collective choice procedure as satisfying the ‘‘top condition'' if an alternative is never among the social choices unless it is on top of at least one individual preference list. Prove or disprove each of the following:
Present value exceeds the projected net present value : Ginger Company recently installed a postaudit program. To motivate their employees to take the program seriously, Ginger established a bonus program. Managers receive a bonus equal to 10 percent of the amount by which net present value exceeds the pr..
Self-employed with an annual salary : Paul Stoddard is self-employed with an annual salary of $90,000. He claims 1 exemption. His social security tax rate is 12.42%, Medicare is 2.9%, and his estimated federal income tax rate is 14%. How much quarterly estimate tax must Paul sent to the ..
Write an informative speech for my communication : Write an informative speech for my communication. - This is an informative speech that needs to be outlined 1st.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Copyrights and patents for computer programs1 what is the

copyrights and patents for computer programs1. what is the difference between a copyright and a patent on a computer

  Supply chains amp system dynamics1 what is your opinion on

supply chains amp system dynamics1 what is your opinion on the questions below?case 1 focuses on beer as an end item

  Brochure advertising your services as a data repository

Create a brochure advertising your services as a data repository. Research commercial data repositories.

  Hierarchical tree

Write a two-and-a-half-page report briefly describing SNMP and its commands and describing MIB-1/MIB-2, including the hierarchical tree, object identifier (OID), groups, and object types

  What is the company where themis system going to be

What is the company where this MIS system going to be? What is the industry this company participates in? Who does this company compete with? Does this new system fit with the company's mission statement?

  It effectively in its logistical operations

How can we evaluate whether an organization is using IT effectively in its logistical operations

  Sales and customer information in a flower shop

Let's analyze the following situation. You have access to the sales and customer information in a flower shop. You discover that the boyfriend of a woman you know is sending roses to three other women on a regular basis

  Obtaining a service or providing information

Write a reflection of no less than 700 words of an experience obtaining a service or providing information to a state or local government entity using information technology.

  Important information about decision support system

Important information about Decision Support System - Explain Provide a decision support system (DSS) function which would be applicable to the automotive manufacturing industry.

  Did your interviewer use any of the ethical tests

How did you prepare for the interview? Did any questions 'stump' you? How did you feel during the interview? How did you feel after the interview? Did your interviewer use any of the ethical tests? What interview tips do you have for your peers?

  Systems planning, development and implementation

Systems Planning, Development, Implementation: what are different types of designs -  characteristics of the system, such as the number, types, and locations of workstations, processing hardware.

  What are the responsibilities of a chief information

1 write a 200- to 300-word response that addresses the followingwhat are the responsibilities of a chief information

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd