Explain in detail why you believe the risk management

Assignment Help Basic Computer Science
Reference no: EM131000661

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

1 For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

2 For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

3 Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

4 Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

5 Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.

• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.

• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

• Use technology and information resources to research issues in information systems security.

 Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131000661

Questions Cloud

Display the characteristics of an animal : Include a brief documentation (in the code or in a separate document) to explain the input (if any), processing and output of the program
Compare your calculations for the two companies : Calculate the gross profit ratio, the inventory turnover ratio, and the average days in inventory for the two companies using the most recent fiscal year data.
Develop forecasts using a three-period moving average : The number of cans of soft drinks sold in a machine each week is recorded below. Develop forecasts using a three-period moving average
How can electromigration be used as property for separation : How can electromigration be used as property for separation?
Explain in detail why you believe the risk management : For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain yo..
Calculate the inventory value at the end of 2011 and 2012 : Calculate the inventory value at the end of 2011 and 2012 using the dollar-value LIFO method.
Proportion of the population in favor of the proposition : An opinion poll based on a sample of 50 subjects estimated p, the proportion of the population in favor of the proposition, as 0.72.
What are the three fundamental analysis strategies : Explain the role and interests of the project champion, organizational management, and end users regarding a new system project. How will each impact the organizational feasibility of the project?
Mercury company has only one inventory pool : Compute the inventory at December 31, 2012, 2013, and 2014, using the dollar-value LIFO method.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a select statement that returns four columns

Write a Select statement that returns four columns from the Invoices table, named Number, Total, Credits, and Balance

  Web service management

How is Web service management different from conventional distributed computing  systems management?

  Framing rules work if stuffing rule to stuff zero changes

Will framing rules work if we change stuffing rule to stuff a zero only after 6 consecutive ones? Describe. Will protocol work if we change stuffing rule to stuff 0 only after a zero followed by 5 consecutive ones? Describe.

  Disaster recovery or business continuity

The following summary must be at least 300 words and list the URL for the article you summarize. Find an online article regarding Disaster Recovery OR Business Continuity.

  Make the color of the text lightblue

Write a CSS rule that gives h1 and h2 elements a padding of 0.5 ems, a dashed border style and a margin of 0.5 ems.

  Evaluate for risk management purposes

Choose three information assets that a typical organization has and evaluate for risk management purposes which vulnerability should be evaluated for additional controls first?

  Create an incident-response policy

Create an incident-response policy that covers the development of incident-response team, disaster-recovery processes, and business-continuity planning.

  Compare the size of all three-image files

Open the GIF image the image editor and save it as a JPG - Reopen the same GIF image and save it as a PNG-8 image - Compare the size of all three-image files

  Write the recursive function c++

write main program that uses the sumbits function to compute the number of bits in the unsigned long integer, and illustrates the work of the show bits function.

  Create a view that lists the isbn and title for each book

Create a view that lists the ISBN and title for each book in inventory along with the name and phone number of the person to contact if the book needs to be reordered. Name the view REORDERINFO

  Determine which relationships will need to be created

Determine which relationships will need to be created, as well as the type of relationship. Clearly indicate the type (i.e., One-to-One, One-to-Many) for all proposed relationships.

  Theater seating revenue with input validation

Theater Seating Revenue with Input Validation: A dramatic theater has three seating sections, and it charges the following prices for tickets in each section:  Section A seats cost $20 each

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd