Describe the process of performing a risk assessment

Assignment Help Computer Network Security
Reference no: EM131267436

Assignment: Organizational Risk Appetite and Risk Assessment

Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization has seen reports of malicious activity on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. The CIO has asked you to prepare a short document before your team begins working. She would like for you to provide an overview of what the term "risk appetite" means and a suggested process for determining the risk appetite for the company. Also, she would like for you to provide some information about the method(s) you intend to use in performing a risk assessment.

Write a two to three page paper in which you:

1. Analyze the term "risk appetite". Then, suggest at least one practical example in which it applies.
2. Recommend the key method(s) for determining the risk appetite of the company.
3. Describe the process of performing a risk assessment.
4. Elaborate on the approach you will use when performing the risk assessment.
5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe the components and basic requirements for creating an audit plan to support business and system considerations.
• Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.
• Use technology and information resources to research issues in security strategy and policy formation.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131267436

Questions Cloud

Evolution of utilizing data analytics in business : Define data analytics in general and provide a brief overview of the evolution of utilizing data analytics in business - Analyze the main advantages and disadvantages of using data analytics within the industry or company that you have chosen.
Is demand elastic or inelastic for your companys product : Is demand elastic or inelastic for your company's product or service? Why? What is the demand elasticity for your offering in an off-line world?
Determine an upper bound of the code word error : Determine an upper (union) bound of the code word error probability for AWGN and soft-decision decoding.
Evaluate quality of each in terms of read and write speed : From the second e-Activity, identify the make and model of one (1) laser printer and one (1) inkjet printer that are similarly priced. Evaluate the quality of each in terms of print speed (i.e., pages per minute), resolution (i.e., dots per inch),..
Describe the process of performing a risk assessment : Recommend the key method(s) for determining the risk appetite of the company. Describe the process of performing a risk assessment. Elaborate on the approach you will use when performing the risk assessment.
Provide a brief summary of the organization : Provide a brief summary of the organization (its culture, its industry, its product and services). Explain why a change was needed. Explain the change that was undertaken
Examine the elements of computer system performance : This discussion activity provides you the opportunity to examine the elements of Computer System Performance and how they interrelate to achieve the performance objectives.
Discuss the role that product demand played in pricing : Apple CEO Steve Jobs alluded to the price a customer may have to pay to own an iPhone when he said that the steep and sudden price change was simply part of "life in the technology lane." What did he mean?
Find the cross correlations of one sequence with each other : Generate all the Gold codes of length 7 and determine the cross correlations of one sequence with each of the others.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  Company financial embezzlement cases

Article topic ideas: Information breaches (these will be the vast majority), disgruntled employee cases involving data theft or leaking of information and company financial embezzlement cases that are directly related to IT

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  Computer security for your company

Present a brief summary of the arguments for and against outsourcing computer security for your company. Select two firms that offer computer security outsourcing services, and compare them and their services. Include several pros and cons of each

  Find one example of password protocols in microsoft product

Find one example of password protocols in Microsoft product and discuss its security or insecurity with your colleagues. If possible, install one of the available cracking tools to see whether you could crack this system and share your experience ..

  Openpgp-compliant email software package on your computer

Install an OpenPGP-compliant email software package on your computer, like any of the ones found at the OpenPGP Alliance (n.d.) Web site or any product in compliance with RFC 4880

  Technical report on a network security topic

You will be required to do a presentation to your class and write a literature review to your tutor as a technical report on a Network Security Topic". You will need to find (at least two) papers on the topic and then confirm them with the lecture..

  Find out the security risks with respect to phishing

mobile banking features have added several advantages for customers however there are security risks that come with

  What are some current issues regarding data security

What are some of the questions you would ask when choosing a DBMS. What are some current issues regarding Data Security

  What are some of the barriers to widespread connectivity

What are connectivity standards and how do they affect the ability of one provider to connect to another?

  Information and communication technology infrastructure

In this Group Project, assume that you and the members of your group are top managers of a big international company spread over several continents. You decide to rebuild/expand your company's Information and Communication Technology infrastructur..

  Functions of the transport and network layers

What are some immediate differences in the two protocols? Does IPv6 provide operational improvement, as well as increased address space? How has/will IPv6 impact organizations, the Internet, and you at home?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd