Develop potential controls that the company could use

Assignment Help Computer Network Security
Reference no: EM131187813

Assignment 2: Identifying Potential Risk, Response, and Recovery

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five page paper in which you:

1. For each of the three or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

2. For each of the three or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

3. Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

4. Draft a one page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

5. Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131187813

Questions Cloud

Determine the maximum stirrup spacing allowed for this beam : Using the two spacings determined in parts (a) and (b), devise an appropriate stirrup spacing layout for this beam.
Most effective contemporary union leaders : Who was one of the most effective union leaders during the 1930s and 1940s? Would this leader be effective now? Why or why not? Who is one of the most effective contemporary union leaders (from the 1970s to today)?
How large should the sample sizes be for each : Assume the branch manager requested estimates of the mean selling price of Gulf View condominiums with a margin of error of $40,000 and the mean selling price of No Gulf View condominiums with a margin of error of $15,000. Using 95% confidence, ho..
Full analysis of a topic covered in class : The research paper will consist of a full analysis of a topic covered in class, (Research topic: Transportation Strategy: (The integration of intermodal transport of maritime and motor).
Develop potential controls that the company could use : For each of the three or more malicious attacks and / or threats identified in Assignment 1, develop potential controls that the company could use to mitigate each associated risk.
Reducing guinea worms in asia and sub-saharan africa : Your discussion must include the following: health condition, global importance of the health condition, intervention or program, cost-effectiveness, and impact. Describe at least 2 ways these environmental and organizational challenges wer..
Describe the characteristics of the perfect manager : Write a one to two (1-2) page paper in which you describe the characteristics of the perfect manager to see a company through all stages of organizational growth
Discussion on a project management topic : This activity will provide you with an opportunity to engage in discussion on a project management topic that was covered in this module. The class interaction will foster a learning environment in which you will learn from each other's experience..
Additional research or academic information : Incorporate additional research or academic information to support your presentation. Format your PowerPoint® speaker notes according to APA guidelines.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the general intent of a trojan horse

Explain the general intent of a Trojan horse.

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  Provide security consultant service to a medium veterinary

Assume that you have been hired to provide security consultant service to a medium veterinary practice (300 employees) to help them prepare a Contingency Planning (CP) document.

  Implement a secure network infrastructure

Implement a secure network infrastructure for a commercial LAN or WAN environment - Understand the impact on the social and commercial environment of network security design

  Using biometric device at office and home easily and cheaply

ESSAYS a special requirement mentioned back in milestone 1, Jack millss wished the system to have "state-of-the-art-maybe some biometric device which can be used in office and at home easily and cheaply.

  Describe copyright-public domain and fair use

Briefly describe copyright, public domain, and fair use. Provide a unique example of fair use. Provide an example of when copyright would be violated. Be sure not to duplicate an example that is already posted by one of your classmates times roman..

  Encrypt the plaintext sendmoremoney with the key stream

Explores the use of a one-time pad version of the Vigenère cipher. In this scheme, the key is a stream of random numbers between 0 and 26. For example, if the key is 3 19 5..., then the first letter of plaintext is encrypted with a shift of 3 lett..

  Network security hii need the attached assignment done by

hi ltbrgti need the attached assignment done by 120914. please quote the best price. the assignment should be completed

  Describe the four types of network testing

Describe the four types of network testing typically performed. What is regression testing? Why is regression testing usually an important part of network testing

  What is meant by multi-modal biometrics for access control

What is meant by "Multi-modal Biometrics" for access control. In theory and in practice, what quantifiable advantages and disadvantages can be attributed to multi-modal biometrics

  Internet technology- marketing and security

Internet Technology, Marketing, and Security

  What is the regulating agency for the sarbanes-oxley act

What is the regulating agency for the Sarbanes-Oxley Act. The stated purpose of the __________ is to develop protocols and guidelines that unify the World Wide Web and ensure its long-term growth.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd