Describe the process of performing risk assessment

Assignment Help Basic Computer Science
Reference no: EM132393828

Assignment : Organizational Risk Appetite and Risk Assessment

Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization has seen reports of malicious activity on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. The CIO has asked you to prepare a short document before your team begins working. She would like for you to provide an overview of what the term "risk appetite" means and a suggested process for determining the risk appetite for the company. Also, she would like for you to provide some information about the method(s) you intend to use in performing a risk assessment.

Write a two to three page paper in which you:

Analyze the term "risk appetite". Then, suggest at least one practical example in which it applies.

Recommend the key method(s) for determining the risk appetite of the company.

Describe the process of performing a risk assessment.

Elaborate on the approach you will use when performing the risk assessment.

Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

The specific course learning outcomes associated with this assignment are:

Describe the components and basic requirements for creating an audit plan to support business and system considerations.

Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132393828

Questions Cloud

How the particular topic impacts health globally : Your paper should include a broad scope of how this particular topic impacts health GLOBALLY. You may choose to focus in on one particular region or country.
Differences between physical and protective barriers : Explain the differences between physical and protective barriers. When should protective barriers be established?
Responsible for labor conditions in suppliers factories : Do you believe the corporates should be held responsible for the labor conditions in their suppliers factories? Why or why not?
How can you use nightingale theory : View the trailer of "An Inconvenient Truth" found on youtube, which is a movie by former Vice President Al Gore. How can you use Nightingale's theory to address
Describe the process of performing risk assessment : Describe the process of performing a risk assessment. Elaborate on the approach you will use when performing the risk assessment.
How provider productivity calculated in the clinical setting : Below is an article that provides great practical information that highlights how provider productivity is calculated in the clinical setting.
BUSS 1010 Community Outreach Project Assignment : BUSS 1010 Core Life Skill Strategies and Techniques Assignment - Community Outreach Project. Homework Help. Middle East College, Oman
What is the recommended order of classes : 1. Why is it important to train product owners and product managers before launching the agile release train?
Difference between attack surface and attack tree : What is the OSI security architecture? Explain the difference between an attack surface and an attack tree. briefly define categories of security services.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a main function that collects a message from the user

Use a variable to keep track of the number of array elements actually used (which could be fewer than 10 if the message is short) so that you do not write out meaningless characters stored at the end of the array."

  Discuss developing a mechanism within http for doing this

Discuss developing a mechanism within HTTP for doing this.

  Cobol within the international symbol

Manifestations of this movement included the slogan to "Kill the COBOL programmer" (not literally, of course) and T-shirts bearing the word COBOL within the international symbol for not permitted (a red circle with a red line diagonally across the..

  What decimal number does the bit pattern

What is the binary representation of the decimal number 5.75 assuming the IEE 754 single precision format?

  Find the marginal product of labor

Explain whether the production function represents a short or long run time frame.

  Determining the maximize profit

Determine how many items you need to sell to maximize profit (note that Profit = Revenue - Cost and Revenue = Quantity times the price per item.

  Two bidders for the unique china teacup it sells

Each of the bidders can either have a high-value of $100 or a low-value of $70 with equal probability. If Anna can only set one price, what price should she set

  Transition to adulthood-emerging adults

Read and summarize a scholarly journal article (published since 2008) with a focus on transition to adulthood.

  Solve the problem by a dynamic programming algorithm

The length of a path is measured by the number of squares it passes through, including the first and the last squares.

  Strengths and weaknesses of university

Strengths and Weaknesses of University that attracts and distracts students from joining that university with respect to the theory of planned behaviour

  A multilevel clustering index on a non-key ordering field

A multilevel clustering index on a non-key ordering field of a file

  State in english the inverse of the contrapositive

Could someone assist me with this practice problem? State in English the inverse of the contrapositive of "If it is raining, then my lawn is wet."

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd