Approaches for mitigating security risk

Assignment Help Other Subject
Reference no: EM132501378

Read the Challenger Constructions case study document before attempting this assignment.

Learning outcome 1: be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.

Learning outcome 2: be able to apply both quantitative and qualitative risk management approaches and to compare and contrast the advantages of each approach.

Learning outcome 3: be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.

Tasks:

You have been employed by Challenger Constructions as their first ever Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company's risks.

1. As the first step, you are to provide a Risk Register for Challenger Constructions. This risk register must contain, as a minimum:
a. A description of each risk identified for each IT asset, data set or process.
b. A summary of the impact or consequence to each IT asset, data set or process, if the identified risk was to arise.
c. The likelihood of this risk occurring.
d. The inherent risk assessment (this is the assessed, raw/untreated risk inherent in a process or activity without doing anything to reduce the likelihood or consequence).
e. The key controls to mitigate the risk (NOTE: it is possible that there may be more than one (1) control needed. Each control should be listed on a separate line) 1. The residual risk assessment (this is the assessed risk in a process or activity, in terms of likelihood and consequence, after controls are applied to mitigate the risk) g. Prioritisation of the risk (what is the priority order for the risks to be addressed).

Your Risk Register should be in table format using the following column headings:
• Risk
• Impact
• Likelihood
• Assessment
• Controls
• Residual Risk
• Priority

You should provide references in IEEE format, particularly for controls to be employed.

Attachment:- Challenger Constructions Case Study.rar

Reference no: EM132501378

Questions Cloud

MITS5002 Software Engineering Methodology Assignment : MITS5002 Software Engineering Methodology Assignment Help and Solution - Research Report, Victorian Institute of Technology - Assessment Writing Service
How does open banking affect customer-centricity : Question - Consider the concept of open banking discussed in class. How does open banking affect customer-centricity
How a sonnet makes an argument : Using the concepts of formalism, explain in an essay how a sonnet makes an argument. Use the sonnet given in the attachment.
ITECH2301 Network Architecture and Design Assignment : ITECH2301 Network Architecture and Design Assignment help and Solution, Federation University - Assessment Writing Service
Approaches for mitigating security risk : Critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk
Determine the free-energy change : Determine the free-energy change and what temperature is the reaction is spontaneous - Report your final answer to the correct number of significant figures
CRJ 410 Advanced Policing Innovations Assignment : CRJ 410 Advanced Policing Innovations Assignment help and Solution, California State University - Homework Help - Implementing Police Innovations Paper
Develop ideas using conceptualisation frameworks : Investigate cases of disruptive innovation in different business and social contexts by applying lean entrepreneurship principles.
BPF2213 Introduction to Finance Assignment : BPF2213 Introduction to Finance Assignment help and Solution, Muscat College - Assessment Writing Service - Analysis of Firm's market standings

Reviews

Write a Review

Other Subject Questions & Answers

  Criminal justice system-process-network and non-system

Discuss the several views of the criminal justice system as it currently operates: the process, network and non-system. Do the three justice components (police, courts, corrections) constitute a true system

  Write a summary of the theories of motivation

Write a summary of the theories of motivation from the perspective of which theory is best for motivating employees in a public organization (your choice).

  The projects problem and proposed solution

Write a narrative of 750-1,000 words that presents the research support for the projects problem and proposed solution.

  How the tips or skills beneficial for strategic negotiators

For the first paragraph of your post, identify two researched resources on negotiation. Provide a brief summary of the main point or perspective of each.

  Differential reinforcement of other behavior

Decide which of the following concepts are most applicable to each scenario: differential reinforcement of other behavior.

  Performance of the isp during the ddos attack

Perform an evaluation of the SLA that you created, and in a checklist format, report on the performance of the ISP during the DDoS attack. Conduct independent

  Which factors do you think are the most important and why

Which factors do you think are the most important and why? Which factors are the most important for reducing or preventing adolescent pregnancy?

  Elizabeth buchanan on virtual research ethics

Read the interview with Elizabeth Buchanan on virtual research ethics: Readings in virtual research ethics: Issues and controversies . (2004, January-June). Information Technology Newsletter, 15(1), 22-25.]. Write a summary of this interview and add ..

  Memory research concerning growth of cognitive perspectives

How has early memory research concerning the growth of cognitive perspectives in psychology changed over the course of the 20th century?

  Describe a realistic change that could be made to address

Identify a problem, inefficiency, or issue within a specific department/unit. Describe a specific, realistic change that could be made to address the issue.

  List at least two advantages of your chosen concept

Of the three concepts, which one do you feel is the most feasible to apply to your daily lives in an effort to reduce waste? List at least two advantages and disadvantages of your chosen concept and defend your choice.

  Non repetitive surge current rating

A high power diode has a fusing coordination value of 3million A^2s. What is the diodes non repetitive surge current rating?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd