Estimate the value of key it assets in the organization

Assignment Help Management Information Sys
Reference no: EM132324332

Assignment: Quantitative risk assessment techniques are valuable tools for organizations.

They provide management with solid numerical data regarding the value and potential loss of assets. This activity allows you to use quantitative risk assessment techniques for YieldMore. Scenario: In order to help make better decisions regarding risk assessment data, senior management at YieldMore has requested quantitative information relating to key information technology (IT) assets. Tasks: You, as an employee of YieldMore, have been given a task of providing quantitative risk assessment information to senior management.

1. Estimate the value of at least five key IT assets in the organization.

2. Be sure you consider direct and indirect financial and business impact of the IT assets.

3. Calculate the single loss expectancy (SLE) of the IT assets. (For this exercise, you will need to estimate this value.)

4. Calculate the annual rate of occurrence (ARO) for risk associated with the IT assets. (For this exercise, you will need to estimate this value.)

5. Calculate the annual loss expectancy (ALE) of the IT assets.

6. Create a professional document to present your findings to senior management.

Reference no: EM132324332

Questions Cloud

Discuss roles of big data analytics in financial institution : Using various articles, discuss the roles of Big Data Analytics in Financial Institutions. Clues: Financial institutions include banking, insurance.
Discuss cultural norms or laws of one country : Discuss cultural norms or laws of one country that differs from the norms or laws of another country. Give an example of the difference by discussing.
What kind of controls does your current employer have : What kind of controls, if any, does your current or a former employer have for risk mitigation such as technical, operational, and management controls.
Essay - explaining bill and the problem its trying to solve : Texas Legislature Assignment - What do you think? Write a 2 - 5 page essay explaining this bill and the problem it's trying to solve
Estimate the value of key it assets in the organization : Estimate the value of at least five key IT assets in the organization. Be sure you consider direct and indirect financial and business impact of the IT assets.
Create a new thread using given details : Create a new thread. As indicated above, discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above.
Illustrate the possible placement of servers : Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers.
What would you do to change or defeat the bill : Interest Groups in Texas Assignment - Minimum Wage. If you were representing the Texas Restaurant Association as a lobbyist, what would you do to change bill
What are some characteristics of perfect competition : Discussion - Banana is a perfect example of perfect competition. What are some characteristics of perfect competition

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why do you not have to include it in an insert statements

Explain the purpose of the field named "id." Why do you not have to include it in an insert statements?

  Essay on classification analysis and hierarchy analysis

Choose one of these problems and write a short essay on how classification analysis, hierarchy analysis, and synectics might be used to structure this problem.

  What three part test will the court use to determine

What three part test will the court use to determine if DDS, as the employer, may be liable for the co-worker's behavior.

  Dial up connectionsfuture security of the dial up

dial up connectionsfuture security of the dial up connections.brief description of what a dial up connection is? and

  Compare the costs of a typical ips to an idps

Using a Web browser, search on the term intrusion prevention systems. What are the characteristics of an IPS?

  How can company protect the new emerging technology

How can company protect the new emerging technology ventures from profit pressures of the parent organization .

  Write a comment of at least three sentences

Search the Internet for an article about MS Office vulnerabilities§ The article must have been published within the past 4 years Scan this forum.

  Evaluate collaboration technologies such as cisco webex

Virtual Meeting Tech could evaluate collaboration technologies such as Cisco Webex, which is a feature laden virtual business meeting tool

  How km at high school benefit from information technologies

Consider a high school with which you are familiar. How can Knowledge Management (KM) at this high school benefit from information technologies?

  Explain with examples the components of pki

Explain with examples the components of PKI? Explain with examples, how can we apply the PKI in real-life?

  Discuss your social media and e-commerce strategies

Discuss your social media and e-commerce strategies. Some possible questions to consider: What types of Web 2.0 strategies would you employ? Would you have a web site? What purpose(s) would it serve?

  How could a business integrate flexible and rigid solutions

How could a business use information technology to increase switching costs and lock in its customers and suppliers?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd