Address risks for data security from the viewpoint

Assignment Help Other Subject
Reference no: EM131667284 , Length: word count:4000

Task

The final assessment for ITC596 is to deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.

Senior executives in both business and technology divisions within Aztec have collected a portfolio of projects from their respective strategists that could be potentially funded for deployment. The portfolio includes projects such as:

- Allowing employees to bring their own devices (laptops, tablets and mobile phones for example) into the workplace to be used as their main or sole devices in achieving their work tasks.

- Migrating business-critical applications and their associated data sources to an external Cloud hosting solution.

- Outsourcing key IT functionality such as the network, desktop management or application development to a third party.

- Upgrading or introducing a major technology such as mobile platforms and applications, migrating to an improved networking technology (such as IPv6), creating a corporate-wide email archive for compliance purposes, or upgrading applications and desktop operating systems.

Each of these potential projects carries significant IT risks which will need to be managed to support the business case as to whether the project should go forward. In this case study, you are the IT Risk Assessment lead at Aztek, and your role is to be the interface between business stakeholders and technologists, translating potential technical difficulties into risk language to facilitate effective decision-making by stakeholders.

For the Aztek case study you will need to select one of the projects from the list above for a thorough IT Risk Assessment. You may select another project beyond those listed above with the approval of the subject coordinator, and you may wish to select a project that is relevant to your workplace for example.

Your deliverable for this ITC 596 Case Study is an IT Risk Assessment report, written for the intended audience of Aztek management providing a risk assessment of the project you have selected to consider.

Your report must be a Microsoft Word document, 15 - 25 pages in length at 12 point font and single spacing. The report must address the following criteria:

- An Executive Summary at the beginning of the report which provides a clear statement of the IT technology project that is being assessed, and an overview of your recommendations to Aztek management as to the merits of the project based on your risk assessment (2 - 3 pages in length).

- A review of the project with respect to the Financial Services sector, which would include any relevant government or industry regulation or compliance, and any established best practices (2 - 3 pages in length).

- A review of the project impact on the current security posture of Aztec, as expressed by its current maturity against IT Security policies and procedures (3 - 5 pages in length).

- A risk assessment based on threats, vulnerabilities and consequences derived from an IT control framework and any existing industry risk recommendations for the project. For example, there are several consortia for Cloud Computing that have created IT Risk Assessments for this technology (4 - 10 pages in length).

- Specially address risks for Data Security from the viewpoint in the project of what data will be used, who will have access to the data and where will the data flow (2 - 4 pages in length).

Reference no: EM131667284

Questions Cloud

The title of a scholarly journal : The title of a scholarly journal (periodical) should appear
Discuss about the personal aspects of employees lives : Should criminal justice managers be concerned with the personal aspects of employees lives?
Create a system to track the number of tickets available : Create a system to track number of tickets available and allow user to buy tickets. There are two type of tickets - VIP tickets and General Floor tickets.
Change the structure of employee compensation : You are the human resources manager for a famous retailer and are trying to convince the president of the company to change the structure of employee.
Address risks for data security from the viewpoint : Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial
Develop a sentence outline for your paper : Develop a 2-3 page sentence outline for your paper, and complete an annotated bibliography.
How would you use data from the foreign exchange market : How would you use data from the foreign exchange market to decide between these two hypotheses?
Show-union operations precede the find operations : Show that, if all the union operations precede the find operations, then the disjoint set algorithm with path compression is linear.
Does the arizona senate bill 1070 promote racial profiling : Does the Arizona Senate Bill 1070 promote racial profiling and is it at face value a racist bill as some contend?

Reviews

len1667284

10/3/2017 3:45:17 AM

Presentation • Assignments are required to be submitted in either Word format (.doc, or .docx), Open Office format (.odf), Rich Text File format (.rtf) or .pdf format. Each assignment must be submitted as a single document. • Assignments should be typed using 10 or 12 point font. APA referencing style should be used. A reference list should be included with each assessment item. • All diagrams that are required should be inserted into the document in the appropriate position. Diagrams that are submitted in addition to the assignment document will not be marked.

len1667284

10/3/2017 3:45:12 AM

• (15%) Executive Summary – clear risk-based opinions that business stakeholders understand and can be used directly for decision-support • (15%) Financial Services sector review – clear perspective to business stakeholders on similar projects in their sector, and any relevant regulation • (20%) Security posture review – clear assessment of the project’s impact on current security posture in terms of changes to the posture and the required mitigation actions to remain at an acceptable posture. • (30%) Threats, vulnerabilities and consequences assessment – demonstrate that the specific changes introduced by the project have been assessed systematically assessed according to lists and frameworks for threats, vulnerabilities and controls. • (20%) Data Security – demonstrate the data flows associated with the project have been identified, assessed against policies and any risks mitigated.

len1667284

10/3/2017 3:45:05 AM

Marking criteria Criteria HD DI CR PS FL Completeness, purpose, meaning, formatting, grammar The report addresses all the stated sections in detail, with a common meaning and purpose flowing through the sections, leading to an authoritative conclusion, in a well-formatted document written without grammatical errors. The report addresses all the stated sections in detail, a common meaning and purpose flowing through the sections, leading to a convincing conclusion, in a well-formatted document written without grammatical errors. The report addresses all the stated sections in detail, leading to a convincing conclusion, in a well-formatted document. The report addresses all the stated sections, leading to a plausible conclusion. The report does not or limited addresses all the stated sections, leading to a plausible conclusion.

len1667284

10/3/2017 3:44:57 AM

This assignment is for students to meet the following learning outcomes. • be able to justify the goals and various key terms used in risk management and assess IT risk in business terms; • be able to apply both quantitative and qualitative risk management approaches and to compare and contrast the advantages of each approach; • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk; • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

len1667284

10/3/2017 3:44:47 AM

Its IT Risk Management Assignment, 4-5000 words is good without Plagarism, and a company in Australia has to be used. Attached is file of the task, please again the company has to be an Australian one, ignore what the report says about the company. Also I m attaching a sample report given to us by the professor for further study following this email .

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd