Determine and report the noted risks to your sector

Assignment Help Management Information Sys
Reference no: EM132240682

Much like a real battle against cyber criminals, the pace of ELITE is rapid, automated, and completely unforgiving of missed deadlines. As a team, you will review the security defense strategies you have determined for your sector (telecommunication).

Conduct independent research on your assigned sector(telecommunication) and share your findings with your team.

After studying the supporting information of your sector, your team will determine and report the noted risks to your sector and your organization in the form of a three-page Risk Profile.

As a team, think about security controls for your sector and use the team's group Discussion area to confer with your team regarding control selection.

Your team should support your strategy by providing risk management techniques through the selection of security controls. These security controls will inform your risk profile and might also be used in ELITE.

From previous projects that dealt in the international domain, include nation state actors that have been deemed threats to your team sector. You can use different sources of threat intelligence to gain deeper understanding of your sector and its methods for critical infrastructure protection.

Many sectors are remotely monitored using industrial control systems (SCADA) and if this is found to be true in your team sector, this description should be included in the risk profile. Also, include an analysis of possible sources and situations of insider threats and if at any time your sector was exploited by an insider threat.

Include how this was detected and what means were used to recover from that type of exploitation. These measures and countermeasures could be part of a security plan and may be incorporated in your selection of security controls in ELITE.

Reference no: EM132240682

Questions Cloud

Discuss your selected organization strengths and weaknesses : During the analysis stage, you consider external factors that pose possible threats to or provide opportunities for your organization and compare these factors.
Submit the network design executive powerpoint presentation : This is a persuasive Executive PowerPoint presentation of up to 15 slides that you will present to the Executive Committee of Fiction Corporation.
What are the differences between elastic-inelastic : What are the differences between elastic, inelastic, unitary elastic, perfectly elastic, and perfectly inelastic?
Compose narrative about your understanding of commview : After reading the instructions for this lab, please compose a 300-word narrative here about your understanding of CommView.
Determine and report the noted risks to your sector : Determine and report the noted risks to your sector and your organization in the form of a three-page Risk Profile.
Discuss a variety of ways to conduct a dos attack : Why is a DoS so serious and how can we defend against it? Of the five DoS types discussed in the text, is it important to understand.
Describe application of capital budget analysis : For your first topic in this conference I would like for you to briefly review either your personal experiences and/or the financial literature to identify.
Describe the business problem that is being faced : Determine whether this is perceived as a larger problem that affects companies providing similar products or services.
What strategies will firms need to adopt : What strategies will firms need to adopt in order to prosper in the environment you foresee? What are the implications for these developments for firms'.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evaluate the effectiveness of a scrum

Assignment: Scrum vs. Plan-Based Software Development Strategies, Evaluate the effectiveness of a Scrum approach compared to a plan-based approach

  Investigate the different information system functions

AM953001: Management Information Systems Assignment. Choose a contemporary industry and investigate the different information system functions

  Briefly describe the proposed technology solution

Briefly describe the proposed technology solution and list the business requirements (including security requirements) that are satisfied

  What is the probability that the shop is empty

What is the probability that the shop is empty?- What is the average number of customers in the barbershop?- What is the average time spent in the shop?

  Case project - investigating possible e-mail fraud

Case Project: Investigating Possible E-mail Fraud, Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it appear to come from another employee's account

  What were the advances in information technology

What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act

  What training is available for an incident handler

What training is available for an Incident Handler, and what are some important skills they must possess?

  Can a pmo accelerate the implementation process

What can you determine about the corporate culture from the fact that they waited this long to consider the development of an EPM system?

  What is a marketing information system

What is a marketing information system (MIS)?- What types of information are included in a marketing information system?

  Discuss about the corporate data mining process

To identify data mining applications in a corporate with complete business requirements fulfilled by applying a suitable data mining process.To develop a suitable data mining process based on previous available processes.To identify data mining app..

  Specific attacks that can be targeted

Revision is required including a more comprehensive analysis of techniques that can be used to acquire information, specific attacks that can be targeted, countermeasures and threats to the organization's web environment

  Describe one challenge of use-case modeling

Describe one challenge of Use-Case Modeling, the biggest challenge from reading in our books would be not knowing how the system using the modeling works.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd