Reference no: EM131205339
Select an organization that you are familiar with or an organization from a published case study.
Find case studies through the following sources or through a faculty-approved source. Suggestions are as follows:
Search within University Library for these periodicals
Information Week
CSO
SC Magazine
The CEO of your selected organization has requested an enterprise security plan from your team. The first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This list should be fairly exhaustive. Many vulnerability and threat pairs will not make the final cut for remediation, but an organization can only properly prioritize these if it has fully covered all of the risks.
Create a list of 30 information security vulnerabilities with related threats relevant to the organization. Keep in mind:
Most vulnerabilities will have more than one related threat.
Cover both physical and logical vulnerabilities.
Place your list in the first two columns of a table in a Microsoft Word or Excel document. The table will resemble the following:
Vulnerability
|
Threat
|
Probability
|
Impact
|
Suggested Mitigation Steps
|
|
|
|
|
|
|
|
|
|
|
Include at least 15 vulnerabilities in your list involving physical security and at least 15 involving logical security.
Note: The other three columns will be used next week. Each row in the table should be a specific vulnerability with a related threat, though it is most likely that some vulnerabilities will have more than one possible threat in the table.
Identity gaps in nursing knowledge
: Identity gaps in nursing knowledge - Determine the need to refine or clarify a concept (a phenomenon of interest); clarify the meaning of terms.
|
Uses the aging of accounts receivable method
: Friedman Company uses the aging of accounts receivable method. Its estimate of uncollectible receivables resulting from the aging analysis equals $26,000. The unadjusted credit balance in the Allowance for Doubtful Accounts account is $8,400 What is ..
|
Draw dependency diagram to show the functional dependencies
: Draw a dependency diagram to show the functional dependencies that exist in this relation - Decompose the Home Library relation into a set of 3NF relations and draw a dependency diagram for each of the 3NF relations.
|
Prepare classified balance sheet in report form
: The following information was obtained from the accounts of Lukes, Inc., as of December 31, 2012. It is presented in scrambled order. Prepare a classified balance sheet in report form. For assets, use the classifications of current assets, plant and ..
|
Create a list of information security vulnerabilities
: The CEO of your selected organization has requested an enterprise security plan from your team. The first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This lis..
|
Define a collective choice procedure as satisfying
: Define a collective choice procedure as satisfying the ‘‘top condition'' if an alternative is never among the social choices unless it is on top of at least one individual preference list. Prove or disprove each of the following:
|
Present value exceeds the projected net present value
: Ginger Company recently installed a postaudit program. To motivate their employees to take the program seriously, Ginger established a bonus program. Managers receive a bonus equal to 10 percent of the amount by which net present value exceeds the pr..
|
Self-employed with an annual salary
: Paul Stoddard is self-employed with an annual salary of $90,000. He claims 1 exemption. His social security tax rate is 12.42%, Medicare is 2.9%, and his estimated federal income tax rate is 14%. How much quarterly estimate tax must Paul sent to the ..
|
Write an informative speech for my communication
: Write an informative speech for my communication. - This is an informative speech that needs to be outlined 1st.
|