Explain in detail why you believe the risk management

Assignment Help Management Information Sys
Reference no: EM131171674

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

Reference no: EM131171674

Questions Cloud

Identify the basic elements of the technology infrastructure : Identify the basic elements of the technology infrastructure used to conduct electronic business. Explain the basic communications and network concepts used in electronic commerce and the basic functioning of the Internet and the World Wide Web.
Welfare reform created federal mandates : The 1996 welfare reform created federal mandates for all but which of the following? Time limits on receiving public assistance. An end to additional money for additional children. Work requirements for those receiving assistance. A “maintenance-of-e..
What is the length of each side of that pentagon : A circle of radius 6 cm is included in a regular pentagon. What is the length of each side of that pentagon?
Will project management work in all companies : Will project management work in all companies? - If not, identify those companies in which project management may not be applicable.
Explain in detail why you believe the risk management : Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization. Draft a one (1) page Executive Summary that details your strategies and recommendations to..
How high above the ground : How high above the ground is she when the wheel has been moving for 7 minutes? (Round your answer to two decimal places.)
Formulate your thesis and create your outline : Formulate your thesis and create your outline, which you will submit with your essay. Cite from the text and make sure all citations follow MLA style; include a Works Cited page at the end of your essay.
Upper level managers middle and lower level managers : Which of the groups should have first insight that an organizational restructuring toward project management may be necessary?
Can you write a vhdl code for the multiplexer : Can you write a VHDL code for the multiplexer of Section 20.3, with both N and M still generic, using only pre-defi ned data types? (In other words, without using the type called matrix in that code or any other user-defi ned data type.)

Reviews

Write a Review

Management Information Sys Questions & Answers

  The usage and influence of outsourcing and cloud computing

the usage and influence of outsourcing and cloud computing on management information systems is the proposed topic of

  Write in a brief about knowledge management systems

Write in a brief about Knowledge management systems and definition and What is the system about?

  Prepare an executive summary document to board of directors

You will need to prepare an executive summary document (1 page maximum) to the board of directors

  Is managementthe is management position the coordinates all

is managementthe is management position the coordinates all systems maintenance projects allocates systems analysts and

  Difference between project, program, portfolio management

What information is typically included in an initial IT project request? In a project charter? Why might companies today develop IS operational plans that cover only one year?

  Requirements and architecture relationship

Requirements and Architecture Relationship-Describe a situation where you might start the design of a software system before the requirement specification is complete. Provide an example to support your answer

  Does the availability and use of social media

Does the availability and use of social media on the Internet really provide businesses with new and different useful information? If so, how?

  Defend against unauthorized access and data loss

defend against unauthorized access and data loss potentially compromising intellectual assets, sensitive data and the company's reputation in the marketplace.

  The goal by eliayhu goldratyour supply chain manager thinks

the goal by eliayhu goldratyour supply chain manager thinks that theories taught in the goal by eliayhu goldratt may

  The role of privacy and security in health information

The role of privacy and security in health information and The three security standards:technical,physical and administrative standards

  Describe about business process re-engineering

Business process re-engineering - Explain how the principles of business process re-engineering should be applied in this case.

  What are the various threats to information security

What are the various threats to information security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd