Write a report on the project IT risks in Cybersecurity

Assignment Help Other Subject
Reference no: EM132125681 , Length: word count:2500

IT RISK MANAGEMENT ASSIGNMENT- Risk Assessment Report

This is an IT Risk Assessment report, written for the intended audience of management providing a risk assessment of a project. The project can be in any of the following areas:

  • Cybersecurity
  • Internet of Things
  • Cloud security
  • Mobile health devices
  • Bring Your Own Device
  • Smart vehicles
  • Or an area in your profession

Scenario options:

1. You can work towards the scenario provided below; or

2. You also have the opportunity to choose your own scenario-based risk assessment that could potentially be drawn from your own professional experience or context. The second option requires a discussion with and approval by your Subject Coordinator. The report structure requirements and criteria should be the same regardless of your scenario.

Provided Scenario

You have been hired as the IT Risk Assessment lead consultant for Gigantic Corporation (your specialisation is based on the area you have chosen above). Your role is to be the interface between business stakeholders and technologists, translating potential technical difficulties into risk language to facilitate effective decision-making by stakeholders. You have been engaged to assess a project that falls into your specialised area. Once you complete a full assessment, you are required to provide the IT assessment report to the management in the department or section that is running the project for Gigantic.

How to complete this task:

1. You will write a report on the project IT risks based on the scenario.

2. Your report must be a Microsoft Word document, 10 - 15 pages in length at 12 point font and single spacing. The report must address the following criteria:

An Executive Summary at the beginning of the report which provides a clear statement of the technology project that is being assessed, and an overview of your recommendations to management as to the merits of the project based on your risk assessment (2 - 3 pages in length).

A risk assessment based on threats, vulnerabilities and consequences derived from an IT control framework and any existing industry risk recommendations for the project. Identify and discuss the key threat agents. What could be done to mitigate the risks and their impact on the system? (4 - 10 pages in length).

Provide a brief summary (literature review) of protection mechanisms you could employ for the information security. (2 - 4 pages in length).

This assessment task will assess the following learning outcome/s:

  • be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.
  • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.
  • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Reference no: EM132125681

Questions Cloud

When should a manager use the excel solver : Why is Scenario Manager useful to a manager wanting to use a model developed with Excel to help make a business decision such as whether to expand his business?
Setup a lvm volume for the sales group : Your task is to use /dev/sdb to create a logical volume named sales_lvm, format it with XFS, and mount under /sales.
Display all of the purchases to the customer : Display all of the purchases to the customer with the original price and the discount price.
What is the objective of recovering data : Consider the hard drive was formatted. What software forensic tool could be used to determine the date and time of formatting?
Write a report on the project IT risks in Cybersecurity : ITC596 IT RISK MANAGEMENT ASSIGNMENT- Risk Assessment Report. Write a report on the project IT risks in Cybersecurity
How many different lines could potentially be : How would the bits of the address be used to indicate the set, line, word and byte? How many different lines could potentially be in a given cache entry?
How this approach will or not protect access to database : Database user names and passwords may be stored in a file separate from the executing body of the program's code.
Write a function float computetax : Write a function float computeTax(float saleamount) that takes the price of a purchase as input,and prints to the screen the amount of the purchase.
Write a matlab script file that finds and displays all safe : Write a MATLAB script file that finds and displays all safe primes between 1 and 1000.

Reviews

urv2125681

10/26/2018 4:00:20 AM

Excellent 1 till now as per the expectation I got very Good marks so please provide this kind of solution. Awesome Job. Submitted by the deadline and received great scores too. Surely recommend to all students. Good work... Really appreciate this service. I used ExpertsMind so many times and from the beginning to end its a really good communication and service. When talking about the assignment it's wonderful and hope I will get a really good mark on it. Thanks.

len2125681

9/28/2018 5:38:25 AM

Your report must be a Microsoft Word document, 10 - 15 pages in length at 12 point font and single spacing. The report must address the following criteria: An Executive Summary at the beginning of the report which provides a clear statement of the technology project that is being assessed, and an overview of your recommendations to management as to the merits of the project based on your risk assessment (2 - 3 pages in length). The report is worth 15 marks of the overall marks available for assessment 3. Engaging with scenario-based tasks provides you with the opportunity to simulate the real-world application of your learning in this subject.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd