Create a list of information security vulnerabilities

Assignment Help Management Information Sys
Reference no: EM131205339

Select an organization that you are familiar with or an organization from a published case study.

Find case studies through the following sources or through a faculty-approved source. Suggestions are as follows:

Search within University Library for these periodicals
Information Week
CSO
SC Magazine

The CEO of your selected organization has requested an enterprise security plan from your team. The first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This list should be fairly exhaustive. Many vulnerability and threat pairs will not make the final cut for remediation, but an organization can only properly prioritize these if it has fully covered all of the risks.

Create a list of 30 information security vulnerabilities with related threats relevant to the organization. Keep in mind:

Most vulnerabilities will have more than one related threat.

Cover both physical and logical vulnerabilities.

Place your list in the first two columns of a table in a Microsoft Word or Excel document. The table will resemble the following:

Vulnerability

Threat

Probability

Impact

Suggested Mitigation Steps

 

 

 

 

 

 

 

 

 

 

 Include at least 15 vulnerabilities in your list involving physical security and at least 15 involving logical security.

Note: The other three columns will be used next week. Each row in the table should be a specific vulnerability with a related threat, though it is most likely that some vulnerabilities will have more than one possible threat in the table.

Reference no: EM131205339

Questions Cloud

Identity gaps in nursing knowledge : Identity gaps in nursing knowledge - Determine the need to refine or clarify a concept (a phenomenon of interest); clarify the meaning of terms.
Uses the aging of accounts receivable method : Friedman Company uses the aging of accounts receivable method. Its estimate of uncollectible receivables resulting from the aging analysis equals $26,000. The unadjusted credit balance in the Allowance for Doubtful Accounts account is $8,400 What is ..
Draw dependency diagram to show the functional dependencies : Draw a dependency diagram to show the functional dependencies that exist in this relation - Decompose the Home Library relation into a set of 3NF relations and draw a dependency diagram for each of the 3NF relations.
Prepare classified balance sheet in report form : The following information was obtained from the accounts of Lukes, Inc., as of December 31, 2012. It is presented in scrambled order. Prepare a classified balance sheet in report form. For assets, use the classifications of current assets, plant and ..
Create a list of information security vulnerabilities : The CEO of your selected organization has requested an enterprise security plan from your team. The first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This lis..
Define a collective choice procedure as satisfying : Define a collective choice procedure as satisfying the ‘‘top condition'' if an alternative is never among the social choices unless it is on top of at least one individual preference list. Prove or disprove each of the following:
Present value exceeds the projected net present value : Ginger Company recently installed a postaudit program. To motivate their employees to take the program seriously, Ginger established a bonus program. Managers receive a bonus equal to 10 percent of the amount by which net present value exceeds the pr..
Self-employed with an annual salary : Paul Stoddard is self-employed with an annual salary of $90,000. He claims 1 exemption. His social security tax rate is 12.42%, Medicare is 2.9%, and his estimated federal income tax rate is 14%. How much quarterly estimate tax must Paul sent to the ..
Write an informative speech for my communication : Write an informative speech for my communication. - This is an informative speech that needs to be outlined 1st.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss key organizational levels to inventory management

Identify and discuss the key organizational levels relevant to inventory management and warehouse management. Please ensure that your original response is at least 250 words and is supported with references.

  A computer network

Least three methods by which you can monitor threats to a computer network. Describe and provide background information each method. Your paper should be between 800 and 1,000 words and should include citations.

  Explain how you would implement each of the three plans

Describe a minimum of three types of police plans (such as a reactive plan) which could be utilized in the above scenario. Explain how you would implement each of the three plans. Justify your reasoning.

  How a fence register is used for relocating a user program

What are some other modes of access that users might want to apply to code or data, in addition to the common read, write, and execute permission? If two users share access to a segment, they must do so by the same name. Must their protection rig..

  Choose google technologies would you like to research on

Find and choose 5 Google technologies would you like to research on. Share one interesting finding about each technology that you have chosen

  Benchmarking of internal versus external service processes

benchmarking of internal versus external service processes

  Research methodology explained in this solutiondemand for

research methodology explained in this solutiondemand for china rmb currency and will specifically focus on demand for

  Identifies the purpose of the project

Draft a 1-2 page (350 words per page) executive summary that states that identifies the areas of the business to be improved, identifies the purpose of the project, and lists stakeholders associated with the project

  What is a multimedia framework

Have a coding or scripting language to handle user interaction and internal logic. It might have its own "easy to learn" language, or a platform neutral language (e.g. C)

  Depreciation using the revised amounts and straight

depreciation using the revised amounts and straight linecomputer equipment was acquired at the beginning of the year at

  How does harrah strategy differ from its competitors

What are the basic elements of Harrah's closed-loop marketing system and how does it help to improve ROIs? What specific challenge did Expedia face related to customer data? Why was this important to its success?

  Describe the values of the two business intelligence tools

Analyze at least two considerations that would be required to ensure effective transaction transparency of centralized database management systems and distributed database management systems. Justify your response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd