Problem regarding virus-spyware risk assessment

Assignment Help Basic Computer Science
Reference no: EM13829561

Problem:

A successful virus, spyware program, or exploit would be a disaster for any government agency that is providing critical services to the United States and its citizens; therefore, your team must specifically outline the steps involved in the information system (IS) risk assessment and develop an actual IS security risk assessment report for the client.

Provide a report to the client with the following information:

1. A title page

2. Content that includes the following:

  • Introduction to the contents of the report
  • Description of the types of real threats and vulnerabilities that the government agency is facing
  • Description of how the Certification & Accreditation team will determine risk and identify the specific level of risk for each vulnerability 
  • Description of how the organization will track critical deficiencies and the actions that must be taken to mitigate those vulnerabilities
  • Conclusion describing the approach taken with threats, vulnerabilities, tracking, and reporting to meet the Federal Information Security Management Act (FISMA) guidelines

The report should be a minimum of 3-5 pages in length

Additional Information:

This question is from Computer Science as well as it is about a scenario where you need to do risk assessment for virus or spyware attack and outline information security risk for your client.

Total Word Limit: 1151 Words

Reference no: EM13829561

Questions Cloud

What other decisions can capital budget techniques : In addition to project selection, what other decisions can capital budget techniques help managers with?
Review about influence of internet on our daily life : We live in a world where the internet plays a pinnacle role in our day to day lives. Discuss how the internet has caused an ethical debate on our information privacy.
Project scoring approach to capital budgeting decisions : A quasi-subjective project scoring approach to capital budgeting decisions:
Write a note on internal treatment of water : Discuss scales and sludges - Write a note on internal treatment of water
Problem regarding virus-spyware risk assessment : A successful virus, spyware program, or exploit would be a disaster for any government agency that is providing critical services to the United States and its citizens; therefore, your team must specifically outline the steps involved in the infor..
Business risk : Business risk
Investigate the options for the family : Identify a major city outside the state where you are currently living. Your task is to investigate the city for lodging options - investigate the options for the family.
Current structure of us social security program : Current Structure Of US Social Security Program
Estimating the corporate cost of capital : Estimating the corporate cost of capital is:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Illustrate the structure of the program?

The scoring instrument has a section on style. These are the four criteria for style: o Do identifiers logically describe use? o Is indentation used correctly to illustrate the structure of the program? o Is there a consistent naming convention? o Do..

  Deadlock prevention

In  deadlock prevention , we constrain resource requests to prevent at least one of the four conditions of deadlock (Mutual exclusion, Hold and wait, No preemption, Circular wait). This is either done indirectly, by preventing one of the three necess..

  Find the sum of the squares of the integers

Find the sum of the squares of the integers from 1 to My Square, where My Square is input by the user.be sure to check that the user enters a positive integer.

  Generate the random private key

Show that p and q are primes and q|(p ? 1) - Generate the random private key x and compute the public key y.

  Determine relation of m and n-existence of a hash function

Determine the most general relation of m and n that guarantees the existence of a hash function in H that causes no collision when hashing [n] into [m].

  Explain quality of service

Your design team presents a project to you, in which most inputs seem to have about a 1.5-second delay before a response. The lead designer has decided this response is acceptable. Analyze response-time models and decide if the response time in th..

  Demand-paged environment

Which of the following programming techniques and data structures (in a user-level program) are good for a demand-paged environment, and which are bad? Explain your answer.

  Calculate overall return on investment of project

Calculate the overall return on investment of the project and then present a break even analysis. At what point does break-even occur?

  What is the output from the following c++ code fragment

What is the output from the following C++ code fragment

  What do u get when u type in that subarray and why?

so there is an array called arr2=[ 1 2 3; -2 -3 -4; 3 4 5]; what does it mean to access the subarray arr2(:, 1:2:3)? like what do u get when u type in that subarray and why?

  Why is ciso participation in business continuity planning

Title: Why is CISO participation in business continuity planning important? Business Continuity Planning (BCP) is a critical business process which requires the participation of managers from all parts of the enterprise.

  Explaining why facebook-s design is different

Why is Facebook's design different? Or has Google merely perfected something that most organizations have just now started to "tackle"?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd