Describe in detail why you believe the risk management

Assignment Help Computer Network Security
Reference no: EM131177764

Assignment 2: Identifying Potential Risk, Response, and Recovery

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five page paper in which you:

1. For each of the three or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

2. For each of the three or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

3. Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

4. Draft a one page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

5. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

Attachment:- Assignment_1.rar

Reference no: EM131177764

Questions Cloud

Determine the properties of an equivalence relation : Which of these relations on the set of all people are equivalence relations? Determine the properties of an equivalence relation that the others lack
How many gift certificates do you expect : A firm specializing in the diagnosis of automobile engine problems, is planning to open a new service center with two diagnostic bays.-  From your simulation, how many gift certificates do you expect to give out per day?
Differences between arbitration and mediation : Explain the differences between arbitration and mediation. Explain why ADR clauses should be incorporated into hospitality industry agreements.
Efforts and activities in the near future : These changes affect how international companies should approach their marketing activities. In the light of these developments, how do you think marketers will shift their efforts and activities in the near future?
Describe in detail why you believe the risk management : Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.
Find the transitive closure of a relation on a set : Assuming that these algorithms can be used, give big-O estimates for the number of bit operations usingAlgorithm 1 and using Warshall's algorithm to find the transitive closure of a relation on a set with n elements
Prepare a recommendation for the port authority : The Port Authority uses a 10 percent discount rate for capital improvement projects. - assume a 10-year planning horizon, and prepare a recommendation for the Port Authority.
What cooperative strategies are present in the mobile : What cooperative strategies are present in the mobile industry? What types of alliances would you suggest for players in this market?
Main factors managers should consider when deciding : What are the main factors managers should consider when deciding whether or not to manufacture their product in another country?

Reviews

Write a Review

Computer Network Security Questions & Answers

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  Examine major challenge of enforcing policy concerning byod

Describe at least two (2) types of loss that can occur that a standard homeowners insurance policy does not cover. List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile devices.

  How the virus was able to replicate onto remote servers

Create a graphic rendering of how the virus was able to replicate onto remote servers using Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

  Explain simple issue specific security policy in school

Rrules and regulations you have been provided with in your institution.does your school have a similar policy?does it contain all the elements listed in the text?

  Analyse and evaluate risks and security concerns

Analyse and evaluate risks and security concerns with cloud computing discuss strategies for addressing them

  Subnet masking and designing small networks

Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

  Common information security concepts at the apprentice level

Write about common information security concepts at the apprentice level. Your summary must include an analysis that addresses strategic fit

  How the information will be used for system requirements

How the information will be USED for system requirements - what are the key features of the organizational context of the project - why the project will be successful

  Discuss the vulnerabilities in the cyber security

Identify and discuss the vulnerabilities in the cyber security practices and policies at the time of either the event in Georgia, or the event in Estonia, and the global impact resulting from that one particular event. Write about the cyberattack ..

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

  Role of ethics in developing the certification package

Description of the role of ethics in developing the certification package and Description of how to represent the required documentation and requirements in the certification package

  Providing security over data

The CIA triad (confidentiality, integrity, and availability) offers three (3) security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the prima..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd