Deliver an it risk assessment case study

Assignment Help Computer Network Security
Reference no: EM13671075

Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector. 

Senior executives in both business and technology divisions within Aztec have collected a portfolio of projects from their respective strategists that could be potentially funded for deployment. The portfolio includes projects such as 

. Allowing employees to bring their own devices (laptops, tablets and mobile phones for example) into the workplace to be used as their main or sole devices in achieving their work tasks 

. Migrating business-critical applications and their associated data sources to an external Cloud hosting solution 

. Outsourcing key IT functionality such as the network, desktop management or application development to a third party 

. Upgrading or introducing a major technology such as mobile platforms and applications, migrating to an improved networking technology (such as IPv6), creating a corporate-wide email archive for compliance purposes, or upgrading applications and desktop operating systems. 

Each of these potential projects carries significant IT risks which will need to be managed to support the business case as to whether the project should go forward. In this case study you are the IT Risk Assessment lead at Aztek, and your role is to be the interface between business stakeholders and technologists, translating potential technical difficulties into risk language to facilitate effective decision-making by stakeholders. 

For the Aztek case study you will need to select one of the projects from the list above for a thorough IT Risk Assessment. You may select another project beyond those listed above with the approval of the subject coordinator, and you may wish to select a project that is relevant to your workplace for example.

Reference no: EM13671075

Questions Cloud

What elements of the projects might imply greater : What elements of the projects might imply greater or lesser riskiness
Explain how many grams of molten iron will be produced iron : The thermite reaction is given by- Fe2O3(s) +Al(s) ------> Fe(l) + Al2O3(s). Explain how many grams of molten iron will be produced if 2.29 moles of iron (III) oxide is consumed
U.s supreme court case on police misconduct : U.S Supreme Court Case on Police Misconduct
Early and middle adulthood option : Early and Middle Adulthood Option
Deliver an it risk assessment case study : Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.
Research the term venn diagrams in the university library : Research the term Venn diagrams in the University Library or on the Internet.
The name of the course text is organization behavior : The name of the course text is Organization behavior
Affirmative action in federal procurement : The topic of "Affirmative Action in Federal Procurement. Please discuss the current regulatory and legal framework with any key legal cases, be sure to address the most current trends in area
Compare and contrast pure competition with monopoly : 1. Compare and contrast pure competition with monopoly from a pricing perspective. If you were a shipper, which would you prefer? Which would a carrier prefer?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

  Compute the entry in the rijndaels-box

Compute the entry in the RijndaelS-box

  Find the sequence obtained by applying successively the

1 encrypt the message buy now using the knapsack cipher based on the sequence obtained from the super-increasing

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Apple inc is known for its state-of-the-art designs for

apple inc. is known for its state-of-the-art designs for products such as the iphone but most are unaware that apple

  Describe the integrative functions

Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.

  Explain about hashing and message authentication codes

Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

  Explain digital computing/networking in major organizations

Identify and discuss at least three major evolutionary steps in digital computing/networking experienced in major organizations. If possible, provide such insight regarding your current or former organization.

  Outline a plan for the growth of an addressing and naming

outline a plan for the development of an addressing and naming model in an environment of the following scenarioten 10

  Problem on ethereal lab

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ("sniffs") messages being sent/received from/by your computer

  What factors might an organization consider

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd