List current vulnerabilities under the vulnerability column

Assignment Help Operation Management
Reference no: EM132096907

Use the organization you selected in Week One.

Complete the Week Two section of the Security Assessment Worksheet.

Write a 1,050- to 1,400-word paper that discusses how security officials determine vulnerabilities to natural, human-made, and technological threats. Include the following in your paper:

Vulnerabilities associated with informational, technological, natural, and human-made threats

Vulnerabilities associated with personnel and work behaviors

Transportation vulnerabilities

Socio-economic and criminal activity factors associated with the environment surrounding the area

Vulnerabilities associated with neighboring businesses

The completed Week Two section of the Security Assessment Worksheet, submitted as an appendix in the paper

Format your paper consistent with APA guidelines.

Security Assessment Worksheet

Instructions

The Security Assessment Worksheet is designed to identify individual threats specific to your organization of choice. This worksheet will be submitted as an appendix with your Individual Assignments in Weeks One, Two, and Three. See p. 2 for an example and a blank matrix to complete.

Weekly Breakdown:

One: Threat and Risk Assessment Assignment

Threats should include actions that cause immediate or impending damage. Risk is estimated by allocating a probability score on a scale from 1 to 10, where 1 represents a threat that is least likely to occur and 10 represents a threat that is most likely to occur.

Criticality is estimated on a similar scale, where a score of 1 represents a threat that causes the least damage and 10 represents a threat that causes the most damage.

Add the two scales to get the estimated risk score. Upon completion, the ranking score is listed numerically where 1 represents the threat with the highest risk, followed by 2 representing the second highest risk score, and so on until all threats are ranked in order from highest risk to lowest risk.

• Fill in the name of the organization you have chosen.

• List threats specific to the organization

• Add risk scores and rankings with scores specific to the threats.

Two: Vulnerability Assignment

• Consider the vulnerability gaps associated with the chosen organization; these include vulnerabilities associated with crime trends, terrain, geographical location, weather patterns, and so on.

• List current vulnerabilities under the Vulnerabilities column.

• Submit the Security Assessment Worksheet as an appendix to the Week Two assignment.

Three: Managing Vulnerabilities and Applying Countermeasures

• Apply countermeasures to prevent or mitigate the risk and vulnerability associated with each threat.

• List countermeasures and the estimated cost under the Countermeasures & Cost column.

• Submit the Security Assessment Worksheet as an appendix to the Week Three assignment.

Reference no: EM132096907

Questions Cloud

Identify problems with maintaining legacy systems : COIT20246 - ICT Services Management - cq university - Find and summarise ONE resource that describes ONEother commercial IaaS provider that is NOT Google
Describe the process you and your project team would follow : Develop a "Lesson Learned" document for your organization and for your project stakeholders.
What are some best practices for project selection : What are some best practices for project selection? What leads to project success? What leads to project failure?
Identify cyber related issue that require closer examination : Within INTL 647 you are required to identify a cyber-related issue that requires a solution. In this case, you will select a topic or issue as it relates.
List current vulnerabilities under the vulnerability column : Consider the vulnerability gaps associated with the chosen organization; these include vulnerabilities associated with crime trends, terrain.
Prediction on the edges of dataset : A research ?ts a polynomial regression to his data, but ?nds that the prediction on the edges of his dataset are wildly inaccurate.
Considering changing cell phone plan : A real estate agent is considering changing her cell phone plan. If the agent will use the service for daytime calls only,
Way to decide whose clustering result is better : How can this be possible, and what is one way to decide whose clustering result is better?
Research the boeing company on its own website : Research the Boeing Company on its own website, the public filings on the Securities and Exchange Commission EDGAR database.

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd