Would you accept reject transfer or mitigate the risk

Assignment Help Management Information Sys
Reference no: EM131321786

Discussion Question

I need the following discussion questioned answered, with at least 1 reference:

You are the chief information security officer (CISO), and due to a government shutdown and other factors, your desktop team is unable to migrate to Windows 7 as you initially planned. You know that Windows XP support will expire in just two weeks, and your agency will be vulnerable to all types of malware if you continue operating on it after the end of support deadline.

How would you handle this risk? Would you accept, reject, transfer, or mitigate it? How did you come to that decision?

Reference no: EM131321786

Questions Cloud

What is a statistically significant result : Describe in your own words the techniques that scientists use to help them avoid drawing statistically invalid conclusions.
What are the inputs into the forensic analysis model : We indicated in the text that the best ways to manage security threats is to do an extensive risk assessment and more forensic analysis
What is the likelihood of a type 1 error : What is the likelihood of a Type 1 error if the null hypothesis is actually true? What is the likelihood of a Type 1 error if the null hypothesis is actually false?
Determine your first steps and create requirement documents : Assignment- Determine your first steps. Create requirement documents and Explain why you chose the first steps, in your status report due next week
Would you accept reject transfer or mitigate the risk : How would you handle this risk? Would you accept, reject, transfer, or mitigate it? How did you come to that decision?
What is the morally right thing to do : A runaway train is speeding down a track. There are five people tied to the track in the train's path. If the train isn't stopped, the five people will for sure die. You are there near the train, and you happen to see a switch: if you flip the sw..
Construct a frequency distribution of the observed data : Check whether the observed frequency distribution appears to match the expected frequency distribution shown in the binomial distribution in given Figure.
Magnitude of temperature change : Guillaume puts a bottle of soft drink in a refrigerator and leaves it there until its temperature has dropped 12.6 K. What is the magnitude of its temperature change? |ΔT|=12.6 K in degrees Celsius?
Prepare a lease amortization schedule for rode company : Prepare the journal entries on the books of Castle Leasing to reflect the payments received under the lease and to recognize income for the years 2014 and 2015 - Prepare a lease amortization schedule for Rode Company for the 5-year lease term.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  Good and evil on the rails invites debate about the

good and evil on the rails invites debate about the benefits and costs of regulation. after a train crash in california

  Briefly describe the enterprise in terms of its operations

Illustrate how its e-commerce or ERP implementation integrated with related CT (information and communication technologies- data mining. business htelligences. data ware house. databases. internet. RFID. VAN. EDI)?

  Determine and sketch spectrum of resulting pam signal

Figure shows the idealized spectrum of a message signal m(t).- Determine and sketch the spectrum of the resulting PAM signal.

  Explain an alternative proposal for securing the countrys

Explain an alternative proposal for securing the countrys critical infrastructure that does not include having the federal government assume control.

  Show how a software framework facilitates reuse

Software reuse - show how a software framework facilitates reuse

  Is fraud easier on paper or in technology

Is fraud easier on paper or in technology - technology or manipulations of paper documentation?

  Trends shaping the global market for u.s. companies

Trends Shaping the Global Market for U.S. Companies - What major trend/s do you feel are shaping the future of the global market for U.S. companies?

  Plan an e-commerce site for a real or hypothetical business

Plan an e-commerce site for a real or hypothetical business and implement the site using open source tools. Students are to present their plan and implementation in an oral presentation using PowerPoint and in a written summary.

  Ordering and holding costs associated with the director of

ordering and holding costs associated with the director of purchasings policiescalculate the eoqels for the following

  How is a web app different from a desktop application

What operating system does your computer use? What are some examples of applications residing in your personal computer? Do you use any apps or websites now that you think are cloud-based? How is a web app different from a desktop application?

  Create a potential liability as employee can be stolen

Databases create a mass of information that is easily searched and accessed. They also create a potential liability as employee and customer information can be stolen and misused.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd