Describe process of performing risk assessment

Assignment Help Basic Computer Science
Reference no: EM132532955

Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization has seen reports of malicious activity on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. The CIO has asked you to prepare a short document before your team begins working. She would like for you to provide an overview of what the term "risk appetite" means and a suggested process for determining the risk appetite for the company. Also, she would like for you to provide some information about the method(s) you intend to use in performing a risk assessment.

Write a two to three page paper in which you:

Analyze the term "risk appetite". Then, suggest at least one practical example in which it applies.

Recommend the key method(s) for determining the risk appetite of the company.

Describe the process of performing a risk assessment.

Elaborate on the approach you will use when performing the risk assessment.

Use at least three quality resources in this assignment.

Reference no: EM132532955

Questions Cloud

American legal system-retrieve cases : The student will be able to describe the workings of the American Legal system, retrieve cases and statutes from freely-available sources,
How much is the net advantage of planned discount policy : The collection period is expected to decrease to 2 months. ?How much is the net advantage/disadvantage of the planned discount policy?
Discuss the community policing philosophy : Discuss the community policing philosophy. Search your local or regional news web page and locate a current event involving law enforcement officers.
Explain briefly what is meant by tax base : Calculate the taxable temporary difference to be accounted for at 31 December 2004 in relation to property, plant and equipment
Describe process of performing risk assessment : Recommend the key method(s) for determining the risk appetite of the company. Describe the process of performing a risk assessment.
What you would specifically do to study your research topic : Present your research methodology. You need to ensure that the specific steps you will follow to explore your research questions and/or hypotheses are clear.
C Programming : Factory A pays its employees differently depending on his/her position within the organization. Managers receive a fixed weekly salary.
Explain the nature and treatment of sunk costs : Produce calculations which show, on the basis of net present value, whether the new chemical should be produced or not and state your conclusion.
Which evidence could be used to obtain dna : Make a detailed list of evidence that could be collected from the crime scene. Which evidence could be used to obtain DNA? How significant could the CODIS.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Argue that the effects of international trade

Some would argue that the effects of international trade is to take jobs away from domestic workers.

  How steganography works in world of data security

Explain how Steganography works in world of data security. Discuss the many benefits as well as challenges or drawbacks in using steganography to secure data

  Boeing 767 to supply an aerial tanker

Boeing manufactures jet aircraft for commercial use as well as for military use. In February 2011, Boeing won a U.S. Air Force tender for 179 aerial

  How many times each one of them occurs in the string

Write a program that reads a string from the console and prints in alphabetical order all letters from the input string and how many times each one of them occurs in the string.

  Create a dictionary to hold the terms to traslate

A dictionary can't contain multiple item with the same key. A key must be immutable. It can be a string, number or a tuple. A key must be immutable to make sure it is not changed to a key which is already in the dictionary.

  Define scope-schedule-cost and customer satisfaction

Define scope, schedule, cost and customer satisfaction. Why are these considered to be constraints? Answer in 4-5 sentences.

  Write a program to process stock data

Write a program to process stock data. The stock data should be read from a text file containing the following data: stock code, stock name, amount invested (XXX.XX), shares held, and current price. Sue the internet or your local paper to gather..

  Give the coordinates of the ''outliers''

The threshold value you gave, and the maximum distance from the centroid to the farthest point in a cluster for all the clusters. It should also give the coordinates of the 'Outliers' in a separate output file. Outliers are those points that do no..

  Experienced working for both male and female supervisor

During the course of your employment you may have experienced working for both a male and female supervisor.

  Identify individual elements of cybersecurity risk

Identify individual elements of cybersecurity risk. Describe how the organization incorporates privacy principles in relation to data collection, disclosure,

  Find the network id of the lan

Given an IP Packet = 1996 Bytes (header: 20 B + payload: 1976 B), show how you will break the packet into fragments.

  Corporate espionage and government security requirements

Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd