Risk analysis on a school information assets

Assignment Help Basic Computer Science
Reference no: EM131594370

Let's do some risk analysis on a school's information assets. The school stores many types of about students and three of these are: identification information (name, address, SIN, telephone numbers etc.), IT information (username, password, email services, etc.), and financial information (tuition, student loans, banking information, etc.)

a. For EACH of the three types of information describe who would want to illegally access this type of information and why?

b. Consider what the impact would be for EACH of the three types of information mentioned above if the information was improperly accessed or damaged. Is the impact Catastrophic (expose school to serious lawsuits, loss of reputation, and/or information cannot be recreated), Serious (some exposure to lawsuits, loss of reputation and/or information is expensive to recreate), or No Big Deal (small chance of lawsuits, information can easily be recreated). Be sure to justify your choice for each type of information.

c. Now consider what the likelihood is that EACH type of information could be accessed or damaged: not likely, moderately likely, very likely. Justify why you think the information fits in that category.

d. Now let's look at how we can manage the risk. Basic techniques are: avoiding the risk, modifying the risk (impact and/or likelihood), transferring the risk to others, and accepting the risk. What techniques would you use for EACH of the types of information and how would you implement it?

Reference no: EM131594370

Questions Cloud

Discuss how the concept of workstation domains figure : Briefly discuss how the concept of workstation domains figure into your organizations security policies, please cite and list your references.
Determine the transfer function for each system : The pole-zero plots of four causal LTIC systems are shown in Fig. Determine if the LTIC systems are stable. Also determine the transfer function H(s).
Provide examples for the stakeholders to provide context : Provide options and examples for the stakeholders to provide context. Research the types of information these stakeholders might be interested in.
Determine the pole-zero plots of the inverse systems : The inverse of an LTIC system is defined as the system that when cascaded with the original system results in an overall transfer function of unity.
Risk analysis on a school information assets : Let's do some risk analysis on a school's information assets. The school stores many types of about students and three of these are:
Analyze business strategy to identify hr requirements : Analyze international business strategy to identify human resource requirements and formulate supporting HRM plans that can improve productivity.
Examine the laplace transfer function : An LTIC system has an impulse response h(t) with the Laplace transfer function H(s), which satisfies the following properties.
Discuss how important is the role of leadership : With a tremendous amount of focus and attention being paid to those in the law enforcement profession right now, how important is the role of leadership
Discuss the different approaches to public speaking : Discuss the different approaches to public speaking. What is your style, persuasive or informative? Which is more effective and when?

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd