Explain in detail why you believe the risk management

Assignment Help Other Subject
Reference no: EM131408707 , Length: 5

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Explain the concepts of information systems security as applied to an IT infrastructure.

Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

Use technology and information resources to research issues in information systems security.

Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Attachment:- malware_done.rar

Reference no: EM131408707

Questions Cloud

How many different proteins : How many different proteins, 15 amino acid long, could you make given an unlimited number of each of the 20 amino acids? Most real proteins are actually in the range of 300 amino acids long. How many different possible proteins, 300 amino acids i..
Identify two products whose demand is price elastic : Identify 2 Products whose demand is price elastic and explain why. Which of the graphs for the best demonstrates the law of demand? Which of the following graphs best demonstrates the law of supply?
Statement we can make about the p value for the test : Using the appropriate statistical table, what is the most accurate statement we can make about the p-value for the test?
A guide to biology before beginning this lab : Please read Chapter 12 of What is Life? A Guide to Biology before beginning this lab. The purpose of this lab exercise is to demonstrate that plants are in our environment and there is diversity among these plants.
Explain in detail why you believe the risk management : A videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious att..
Identify the warehouse and markets : Consider Reformulate the production planning problem as a transportation model. Identify the warehouse and markets and set up the transportation table.
Write out the constraints and the objective function : Reformulate this problem as an LP model assuming that all backorders must be filled by the end of the 4th week. It is sufficient you define all the variables, write out the constraints and the objective function.
What is parametric counterpart to wilcoxon signed rank test : What is the parametric counterpart to the Wilcoxon signed rank test for paired samples? Compare the assumptions involved in using the respective tests.
Analyze economic theory used to complete the policy solution : Design an economic policy solution to the problem. Analyze the economic theory used to complete the policy solution and determine the impact on the appropriate stakeholders.

Reviews

Write a Review

Other Subject Questions & Answers

  Develop your composition based on area of interest in arts

Trace some of the major contributions of an ethnic or "minority" group to U.S. culture, for example, to music, the arts, dance, or theater. There are many other possibilities! Develop your composition based on an area of interest to you in the art..

  Explain the positive effects of a quality childcare program

create a parenting powerpoint presentation for your early childhood education center to share for new parents. the

  How socialization process increases political competence

In addition to interest groups, political parties play an important role in the political system by socializing citizens to political interests. Explain how this socialization process increases political competence. Who benefits from it

  How women and men treated differently in health care system

Why do you think violence against women is so prevalent in society? What steps do you believe need to be taken in order to address the problem of violence against women?

  Importance of the loise leaky family to paleontology

What is the importance of the loise leaky family to paleontology? What were the important roles of new women of the ice age? (use Article 14 from ANNUAL EDITIONS Archaeology 9th edition) article written by Heather Pringle. titled- new women of the ..

  Development of political and social structures

Discuss the development of political and social structures that produced a strong sense of community and cultural unity among Greeks during the Archaic Age.

  Domestic violence relates to family homelessness

Discuss how domestic violence relates to family homelessness? How does domestic violence affect the adults and children involved? What are the physical, emotional, and social consequences of domestic violence?

  Existential feminist simone de beauvoir

According to existential feminist Simone de Beauvoir, why are women often satisfied with secondary status to men?

  Find the article using the library electronic database

We want to compare the Control group (the simulators or pretenders) to the Experimental group (the Post hypnotic interview) by examining the percent of subjects with accurate memory recollections in each group. What can we conclude? Which group ..

  Developmental research-potential ethical issues

Self-reports are a rather easy and quick way to gather information, there are fewer potential ethical issues than many other forms of research, and they are relatively inexpensive. Why aren't they the method of choice for developmental research?

  Practical methods to improve safety in the workplace

practical methods to improve safety in the workplace. topics include osha and other regulation hazard recognition

  How does differentiation allow for students needs to be

how does differentiation allow for students needs to be met in the classroom? provide several examples of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd