What is the first step in performing risk management

Assignment Help Computer Engineering
Reference no: EM131192167

Assignment: Defining the Scope and Structure for an IT Risk Management Plan

Overview

In this lab, you defined the purpose of an IT risk management plan, you defined the scope for an IT risk management plan that encompasses the seven domains of a typical IT infrastructure, you related the risks, threats, and vulnerabilities to the plan, and you created an IT risk management plan outline that incorporates the five major parts of an IT risk management process.

Lab Assessment Questions & Answers

1. What is the goal or objective of an IT risk management plan?

2. What are the five fundamental components of an IT risk management plan?

3. Define what risk planning is.

4. What is the first step in performing risk management?

5. What is the exercise called when you are trying to gauge how significant a risk is?

6. What practice helps address a risk?

7. What ongoing practice helps track risk in real time?

8. True or False: Once a company completes all risk management steps (identification, assessment, response, and monitoring), the task is done.

9. Given that an IT risk management plan can be large in scope, why is it a good idea to develop a risk management plan team?

10. In the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, treat, and monitor?

11. Which compliance laws or standards does the health care organization mentioned in the Hands- On Steps have to comply with (consider these: Health Insurance Portability and Accountability Act [HIPAA], Gramm-Leach-Bliley Act [GLBA], and Family Educational Rights and Privacy Act [FERPA])? How does this impact the scope and boundary of its IT risk management plan?

12. How did the risk identification and risk assessment of the identified risks, threats, and vulnerabilities contribute to your IT risk management plan outline?

13. What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability?

14. For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastructure to help mitigate risk?

15. For risk mitigation, what processes and procedures can help streamline and implement risk- mitigation solutions to the production IT infrastructure?

16. What is the purpose of a risk register?

17. How does risk response impact change control management and vulnerability management?

Reference no: EM131192167

Questions Cloud

Matter are present inside the container : A 50.0 g piece of CO2(s) (i.e. "dry ice") is sealed inside a0.250 L container held at 20°C. Based on the phase diagram of CO2(Figure 11.42 in the textbook), what state(s) of matter are present inside the container?
How was your professional work impacted by the stressor : In this portion of the paper, you should provide information from the textbook and an additional source identified from the CSU Library to analyze the impact that the stressful event could have placed upon your health, future goals, and motivation..
Supply chain management is the purchasing strategy : One of the most strategic decisions facing a company in supply chain management is the purchasing strategy. In most industries, cost of raw materials and procured components consume a significant portion of the company's budget.
Deployment services and the windows automated installation : For a highly virtualized data center, how does this change the deployment options available from traditional data centers? Is there any benefit or need in using some of the traditional deployment options (e.g., disk imaging using software like Gho..
What is the first step in performing risk management : What is the first step in performing risk management? What is the exercise called when you are trying to gauge how significant a risk is? What practice helps address a risk? What ongoing practice helps track risk in real time?
Biggest dangers of bring your own device : What do you think are the biggest dangers of bring your own device (BYOD)? What are the best ways for a company to protect against this threat? Justify your answer
Prevalent mobile computing limitations : What do you think are the most prevalent mobile computing limitations? Justify your answer
Information assurance capstone : 1. In the connection of data preparing, PC security and trusted frameworks, clarify what is implied by the accompanying terms and why we need to utilize them:
Prepare a tender for the installation of steel street lamps : Prepare a tender/estimate for the installation of 20 steel street lamps in 5 streets of a small town to replace ageing concrete lamp standards

Reviews

Write a Review

Computer Engineering Questions & Answers

  What personnel implications are when setting up a wan

What personnel implications are when setting up a wan? You are hired by a firm that has offices in Peru, France, the United States, and Hungary. Your job is to coordinate a team of IT workers to connect all of individual sites into one large WAN.

  Select a large multinational organisation that has

select a large multinational organisation that has succeeded in effectively aligning its business and isit strategies

  What is the maximum achievable data rate

If a binary signal is sent over a 10Khz channel whose signal-to-noise ratio is 20dB, what is the maximum achievable data rate?

  Interval coding1 for the ensemble x with alphabet a 1 2 3

interval coding1. for the ensemble x with alphabet a 1 2 3 and probabilities p 14 13 512 a evaluate the cumulative

  Questiona bank has its head office in stoke it has two

questiona bank has its head office in stoke. it has two branches one in longton and other in burslem. each customer

  Complete specification of a software design

List the four design models required for a complete specification of a software design and the role of each.

  Devise a data structure and a suitable algorithm

As stated in the text, a priority queue is a queue in which certain items are allowed to jump to the head of the line if they meet certain conditions - Devise a data structure and a suitable algorithm to implement a priority queue.

  Describe a disaster that would require database recovery

Describe a disaster that would require database recovery and discuss your thoughts on preparing for and recovering from that disaster.

  Write a paragraph of at least 200 words addressing the

write a paragraph of at least 200 words addressing the following how would you describe web 2.0 to someone who has not

  Prepare a er diagram for the daycare

Create an ER diagram for the Daycare. The daycare keeps track of every family. A family can have two parents, an unlimited number of children, current address for parent 1, current address for parent

  Compare by using exception handling for input data

compare using exception handling for input data validation with using if and switch statements. when would you use each

  What tools you would need to conduct the site

what tools you would need to conduct the site survey and why each is required.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd