Perform a risk assessment and threat identification

Assignment Help Management Information Sys
Reference no: EM131673786

STRUCTURED EXTERNAL ASSIGNMENT

Every organization is faced with some kind of risk or threat that could cause an interruption to the organization's operations. These risks and threats can be internal or external.

To prepare for these events, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects. Performing a risk assessment is one of the most important steps in the risk management process.

A Risk Assessment is periodic assessment of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization.

Many organizations perform risk assessments to measure the amount of risks that could affect their organization, and identify ways to minimize these risks before a major disaster occurs.

In this paper the student must identify the risks and potential effects associated with the areas of the organization pertaining to security and disaster recovery.

Please be sure to include the following:

· Introduction of the organization

· Overview of the IT department and personnel

· Discuss the occurrence or breach or disaster that has happened.

· Perform a risk assessment and threat identification section for the organization that you have chosen, as outlined in CHAPTER 2, 7, 8, and 9 in RISK ANAYSIS AND THE SECURITY SURVEY.

This section should point out the organizations weaknesses or vulnerabilities. This will be your hypothesis as to why the breach or disaster has occurred.

· Create a response plan as identified in Chapter 14 of RISK ANAYSIS AND THE SECURITY SURVEY.

· Be detailed in your response plan as this will be the most critical part of your paper. You can create your own response plan even if the organization has its own plan. This plan will be in direct response to remedying the issues that were caused by the breach or disaster.

Structure:

· No less than 7 pages

· Must be your own work not a group activity

· No plagiarism

· APA format

· Master's level work expected

· Correct punctuation, spelling, and grammar are essential.

· Must have a cover page with course name, student's name, date, and title of paper.

· Pages must be numbers.

Please remember the following:

Double spaced

12 pt

1 inch margins

Proper grammar

Run your paper through a plagiarism checking site

Please complete your own work do not copy and paste from any other source

7 page minimum NOT COUNTING TITLE PAGE, REFERENCE SECTION, TABLE OF CONTENTS

Number your pages

Title page should have the course number and name, your name, date, and title of your paper

Please make sure to do the following:

Research an organization,

Discuss the organization size, hardware, software, it department, personnel, the incident that took place, complete a disaster recovery plan, or a business continuity plan, or complete a risk assessment and analysys.

You can use any and all of the lessons and items learned in class to complete your paper.

Attachment:- Chapters (10-10-17).rar

Reference no: EM131673786

Questions Cloud

By how much are profits underestimated : Suppose sales revenues exceed the estimated amount on the income statement by $1,500,000. Without preparing a new income statement.
Describe the australian governments ism and pspf : Describe the Australian Government's ISM and PSPF with particular emphasis on information classification.
Application process of several potential sponsors : Explain the sponsorship criteria and application process of several potential sponsors for an event.
Which firm has the higher economic value added : Which firm has the higher economic value added? Which has higher economic value added per dollar of invested capital?
Perform a risk assessment and threat identification : Identify the risks and potential effects associated with the areas of the organization pertaining to security and disaster recovery.
Compute the additional profit that tensing would earn : Compute the contribution margin ratio. Using that ratio, compute the additional profit that Tensing would earn if sales were $37,000 more than expected.
Calculates the total cost of ownership of each machine : Calculates the total cost of ownership of each machine. Based on the TCO calculation, specify which model you recommend purchasing.
About the personal ethics : Review the list of possible personal ethics scenarios presented below. Pick three of these scenarios, and conceptualize how you might resolve the issue.
Compute the margin of safety in units : Compute the additional operating income that Jellico would earn if sales were $50,000 more than expected.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Do employees know their responsibility under given policies

Are employees aware of the IT security policies in the Employee Handbook? Do employees know their responsibilities under those policies?

  Structured explanation of sustainable mis practices

Management Information System (MIS) Practices - The response gives you a structured explanation of sustainable MIS practices

  The most common transmission medium is the twisted pair

The Most Common Transmission Medium is the Twisted Pair - identify at least one application that would not be able to use it.

  Why is it important to make the distinction

What one thing do you think is wrong and what recommendation would you make concerning requirements gathering? Let's call the two people Bill and June.

  How its e-commerce or erp implementation integrated

Illustrate how its e-commerce or ERP implementation integrated with related ICT (information and communication technologies- data mining, business intelligences, data ware house, databases, internet, RFID, VAN, EDI)?

  How has digital media influenced the culture

How has Digital Media influenced (or changed) the field of e-commerce? Include a historical (before and after the digital media) and global perspective (include discussion of the US and at least two additional countries). Support your discussion ..

  How many search results were returned

Describe the steps you took to refine your search results (e.g. any filters you applied, sorting, etc.). How many results were returned in each step? Did you have to refine your search terms to get additional results? If yes, what new search terms..

  What is a potential benefit of supply chain visibility

What is a potential benefit of supply chain visibility and what was the limitation of Excel-based data analytics at Safeway?

  Demonstrate the use of conditional and looping structures

The Java application should also meet these technical requirements: The application should have at least one class, in addition to the application's controlling class. The source code must demonstrate the use of conditional and looping structures

  How the technology creates or contributes to the problem

Choose one ethical issue arising from the use of ICT that has been reported in the press in the last one year, and discuss it in depth. Show why or how the technology creates or contributes to the problem

  Which were most difficult to specify in terms of a scenario

Stimulus. The stimulus is a condition that needs to be considered when it arrives at a system.

  How a system could improve efficiency

As the new manager of a convenience store, you have noticed issues with the manual method of tracking sales using paper sales tickets and spreadsheets, as well as, shortages on some of the more popular items carried in the store. How a system coul..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd