Deliver an it risk assessment case study

Assignment Help Computer Network Security
Reference no: EM13671075

Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector. 

Senior executives in both business and technology divisions within Aztec have collected a portfolio of projects from their respective strategists that could be potentially funded for deployment. The portfolio includes projects such as 

. Allowing employees to bring their own devices (laptops, tablets and mobile phones for example) into the workplace to be used as their main or sole devices in achieving their work tasks 

. Migrating business-critical applications and their associated data sources to an external Cloud hosting solution 

. Outsourcing key IT functionality such as the network, desktop management or application development to a third party 

. Upgrading or introducing a major technology such as mobile platforms and applications, migrating to an improved networking technology (such as IPv6), creating a corporate-wide email archive for compliance purposes, or upgrading applications and desktop operating systems. 

Each of these potential projects carries significant IT risks which will need to be managed to support the business case as to whether the project should go forward. In this case study you are the IT Risk Assessment lead at Aztek, and your role is to be the interface between business stakeholders and technologists, translating potential technical difficulties into risk language to facilitate effective decision-making by stakeholders. 

For the Aztek case study you will need to select one of the projects from the list above for a thorough IT Risk Assessment. You may select another project beyond those listed above with the approval of the subject coordinator, and you may wish to select a project that is relevant to your workplace for example.

Reference no: EM13671075

Questions Cloud

What elements of the projects might imply greater : What elements of the projects might imply greater or lesser riskiness
Explain how many grams of molten iron will be produced iron : The thermite reaction is given by- Fe2O3(s) +Al(s) ------> Fe(l) + Al2O3(s). Explain how many grams of molten iron will be produced if 2.29 moles of iron (III) oxide is consumed
U.s supreme court case on police misconduct : U.S Supreme Court Case on Police Misconduct
Early and middle adulthood option : Early and Middle Adulthood Option
Deliver an it risk assessment case study : Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.
Research the term venn diagrams in the university library : Research the term Venn diagrams in the University Library or on the Internet.
The name of the course text is organization behavior : The name of the course text is Organization behavior
Affirmative action in federal procurement : The topic of "Affirmative Action in Federal Procurement. Please discuss the current regulatory and legal framework with any key legal cases, be sure to address the most current trends in area
Compare and contrast pure competition with monopoly : 1. Compare and contrast pure competition with monopoly from a pricing perspective. If you were a shipper, which would you prefer? Which would a carrier prefer?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Automating compliance with federal information security

Automating Compliance with Federal Information Security Requirements," on page 115 of the text Information Security: Contemporary Cases. Also, you will be creating a PowerPoint presentation that explains the information that you wrote in your p..

  Find out the modification made to the excel spreadsheet

A dissatisfied employee that is planning to leave an organization decides to delete a file from the server. He then copied an Excel Spreadsheet into another file, modifies the new file and deletes the old file.

  Ientify another application other than course management

security change management and architectural adaptationthe online course management system from previous assignments is

  Define cybersecurity as an organizational strategy

Prepare a short paper of approximately 8-12 ( double spaced)pages investigating the strategic impact of cybersecurity in the organization with a special focus on its ethical and legal implications.

  Dealing with computer security

Computer Security is very important for organizations and if not impliedproperly it may have a very big impact on its overall working system.

  Write a program in to find the largest value of k

Write a program in to find the largest value of k such that there exists a k-core in a given undirected graph G = (V, E). Also print out the nodes in the largest k-core.

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Describe how to select public and private keys

Describe the RSA Public Key Encryption Scheme in detail. In particular, how do encryption and decryption algorithms work? Describe also how you select public and private keys.

  Abc institute of research has sensitive information that

abc institute of research has sensitive information that needs to be protected from its rivals. the institute has

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd