Analyse the various approaches for mitigating security risk

Assignment Help Management Information Sys
Reference no: EM131299678

Assessment Task -

Specific issues that you need to address in the forum discussions are provided within the first 3 topics.

These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts.

As this is a postgraduate course. it is expected that your written responses will provide you an opportunity to express your personal and professional views. There are no correct answers, however the way you justify your answers with validated evidence is key to this activity.

Post your forum entries as you are prompted within the topics. Your Subject Coordinator will respond to your first forum post and monitor and moderate as required the remaining 2 posts.

You must curate, collect and save your responses in a word document to be submitted on EASTs. This activity's final mark will be provided prior to the final assessment item.

Rationale

As this is a graduate course, more is expected from students in the way of participation, and further as a graduate reading course, the opinions of students are actively sought to demonstrate that the reading material has been read, understood and provoked a response. The readings on a given topic will in general not agree on all issues in the topic, such as the role and feasibility of cyber-insurance, and soliciting written responses from students gives an opportunity for expressing opinions from the professional experience of each student. Also being a distance course, regular posting on the forum promotes the cohesion of the cohort and a notion of group learning for this course. This assignment is for students to meet parts of the following learning outcomes.

  • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk:
  • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Textbook - Inside the Security Mind Making the Tough Decisions by Kevin Day.

Reference no: EM131299678

Questions Cloud

Mcdonalds tracking survey presented in branding brief : Consider the McDonald's tracking survey presented in Branding Brief. What might you do differently? What questions would you change or drop?
Draw entity relationship diagram of state tennessee tn : Draw Entity Relationship Diagram (ERD) of state Tennessee TN. You could also list, for example, top five hospitals, or the bottom five percent. Set "Top Values" property on the property sheet in the Query Design screen.
Employ projective techniques to attempt to identify sources : Pick a brand. Employ projective techniques to attempt to identify sources of its brand equity. Which measures work best? Why?
Can you profile the brand personalities of the leading brand : Can you profile the brand personalities of the leading brands in the category using Aaker's brand personality inventory?
Analyse the various approaches for mitigating security risk : Specific issues that you need to address in the forum discussions are provided within the first 3 topics. Be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk
Conduct a branded and unbranded experiment : Choose a product. Conduct a branded and unbranded experiment.- What do you learn about the equity of the brands in that product class?
Does the firm appear to have an agency problem : Evaluate the firm's approach to pollution control. Does it seem to be ethical? Why might incurring the expense to control pollution be in the best interests of the firm's owners despite its negative effect on profits?
What do you think of the interbrand methodology : How do you think Young & Rubicam's Brand Asset Valuator relates to the Interbrand methodology? What do you see as its main advantages and disadvantages?
Images or diagram of sample products : For your midterm project complete the following using screenshots, images or diagram of sample products, processes, etc. to illustrate and descriptive texts to address the items below (you may also consult YouTube.com as a source) This is not a re..

Reviews

len1299678

12/3/2016 6:34:00 AM

In this you will have to select any 3 topics from it book which I will email you and Go to topic one which is book. Look at the index chapters and topics will b there select any three topics from it write down 500 words on each topic with APA reference style as well as in text referencing need all three in same word file. Here I have attached book for itc subject for assignment 1 from that you will have to choose any 3 topics and writer down 500 words on each topic in one word file with apa6 reference style list as well as in text referencing.

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd