Develop strategies to mitigate risk

Assignment Help Management Information Sys
Reference no: EM131819403 , Length: 5

Assignment : IT Risk: Analyzing Personal and Business Vulnerabilities

Large organizations are not the one ones susceptible to threats of potential privacy and data security breaches. Individuals are also prone to vulnerabilities that may result in attacks and identity theft.

The evoluation of the Internet has resulted in an exponential growth in exploits, malware, and other types of attacks for both individuals and for e-Commerce. Imagine that you are an IT professional and Web application developer for a retail company.

Part of your job entails anticipating potential risks and develop strategies to mitigate them.

Write a three to five (3-5) page paper in which you:

Explain the major effects that the advancement of technology has provided to businesses in relation to opportunities for more efficiency, collaboration, and distributed resources.

Note: Be sure to include how the security landscape has changed.

Analyze the major differences between the types of threats and vulnerabilities that exist between personal use and business use of the Internet.

Suggest two (2) ways that you would incorporate perimeter defense into a risk management plan.

Your retail organization has decided to do internal Web hosting. Assume that your Website is mission critical. Speculate on the top five (5) anticipated Website attack risks. Provide specific mitigation strategies to address each risk.

Use at least four (4) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.

Format your assignment according to the following formatting requirements:

Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Analyze the impact of the Internet and Web applications on the business world.

Analyze common Website attacks, weaknesses, and security best practices.

Use technology and information resources to research issues in securing Web-based applications.

Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions.

Reference no: EM131819403

Questions Cloud

Determine which three attacks you want to include : Determine which three (3) attacks you want to include in your presentation and provide a brief description of each.
How to report accounts receivable on the balance sheet : Applying the allowance method (percent-of-sales) to account for uncollectibles During its first year of operations, Fall Wine Tour earned net credit sales.
Financial futures market to offset interest rate risks : What is meant by "hedging in the financial futures market to offset interest rate risks"?
What is the amount of discount on these bonds at issunace : What is the amount of the discount on these bonds at issunace
Develop strategies to mitigate risk : Explain the major effects that the advancement of technology has provided to businesses in relation to opportunities for more efficiency, collaboration.
Applying the allowance method to account : Applying the allowance method (percent-of-receivables) to account for uncollectibles. The Accounts Receivable balance for Lake, Inc. at December 31, 2015.
Offered contract to produce part for new printer : Your factory has been offered a contract to produce a part for a new printer. What does the NPV rule say you should? do?
Prepare the journal entries that should be made : Prepare the journal entries that should be made in 2010 and 2011 to record the transactions related to the premium plan of the Sycamore Candy Company
Marginal social costs : If, at a given level of output, marginal social benefit is greater than marginal social costs, then: a) Social surplus will increase if quantity increases

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evaluate level of efficiency of technology implementation

HI5019 STRATEGIC INFORMATION SYSTEMS ASSIGNMENT - BUSINESS REPORT. Evaluate the level of efficiency of the technology implementation.

  Describing functions of the chosen case tools

Choose one or more CASE tools that support system process definition. Write a short essay describing functions of the chosen CASE tools with advantages and disadvantages of each function

  What are some reasons why ecommerce fails

What are some reasons why eCommerce fails? Identify two reasons why the concept doesn't work for all products or services. What do you feel is the future of eCommerce? Will it eventually replace the brick and mortar buildings? Why or why not.

  Identify the major types of information systems

ACC-640- Advanced Managerial and Cost Accounting - What problems do the previous information systems solve and what is the impact of using the previous information systems on the organization?

  What are your thoughts about the use and role of it

What are your thoughts about the use and role of IT in general as we work our way through and out of the economic recession

  Suggest the ways to improve way llc and mac are used for lan

Transmission Medium. Please respond to the following:Suggest 3 ways to improve the way LLC and MAC are used for LAN operation.Evaluate guided and unguided transmission medium to determine which you would use to design a new facility.

  Discuss the indirect costs that an it project may encounter

Discuss the indirect costs that an IT project may encounter during the execution phases. Discuss how these may be evaluated and included in the project budget during the planning phases of the project

  What is an information system and how does it work

What is an information system? How does it work? What are its management, organization, and technology components and why are complementary assets essential for ensuring that information systems provide genuine value for organizations?

  Workplace telecommunications systemsprepare a paper

workplace telecommunications systemsprepare a paper describing the telecommunication systems used at your workplace.you

  What are the responsibilities of a chief information

1 write a 200- to 300-word response that addresses the followingwhat are the responsibilities of a chief information

  Describe the seven critical characteristics of information

Describe the seven critical characteristics of information. How are they used in the study of computer security? What is risk appetite? Explain why risk appetite differs for every organization.

  Analyze how you feel pixlee uses information systems

Analyze how you feel Pixlee uses information systems for its customers' competitive advantage.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd