Develop risk management plan

Assignment Help Basic Computer Science
Reference no: EM132785798

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.

Company Products

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company's HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors' personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company's products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company's products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management's desire to react to any and all material risks that are identified within the new plan. Given the company's annual revenue, reasonable expectations can be determined.

Project Part 1 Task 3: Risk Mitigation Plan

Senior management at Health Network allocated funds to support a risk mitigation plan, and have requested that the risk manager and team create a plan in response to the deliverables produced within the earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop this new plan.

Evaluation Criteria

Did the student develop a high-quality risk mitigation plan based on material provided in the course?

Did the student use information obtained from the earlier parts of the project to build out a risk mitigation plan?

Did the student create a professional, well-developed draft with proper grammar, spelling, and punctuation?

Reference no: EM132785798

Questions Cloud

Advance computer architecture : Explain the following concepts: Neuromorphic computing, Zettascale computing, Quantum computing, Nanocomputing, Edge computing, Colossus
Two new auditing roles in Oracle : Discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary?
KNN Regression : Each of the K neighbors has an influence that is inversely proportional to the distancefrom the point
Compute maximum flow for the new network : Give efficient algorithm to compute a maximum flow for the new network. What is the worst case time complexity of your algorithm?
Develop risk management plan : Apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.
Chain of Custody : You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver,
Dissertation Discussion : Your chosen research design must address reliability and validity issues. How will you insure the measures you are using are valid and reliable.
Sequences and series to solve engineering problems : Using sequences and series to solve engineering problems - Examine how matrices, determinants and complex numbers can be used to solve engineering problems
Identify different types of diode : Identify different types of diode and their uses and Construct a schematic diagram and simulate the operation of a diode as a half-wave rectifier

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Application software and system software inventions

List 2 application software and 2 system software inventions that took place in the past 10 years. When was the software invented/introduced? What was the invention? Who invented/introduced the software? You should have a total of 4 inventions lis..

  Discussed how for-profit and not for-profit institutions

Provided in the lecture I briefly discussed how for-profit and not for-profit institutions are similar, adding to the content in the chapter.

  Discuss where a computer stores its basic hardware

Discuss where a computer stores its basic hardware settings, why it does so, and what some of those settings are. Compare storage devices using four criteria: versatility, durability, speed, and capacity.

  Process of socio-economic development

According to Trutnev, Vidyasova, and Chugunov (2015), informational and analytical activities and forecasting for the process of socio-economic development

  Mobile systems are having major impact on business

Mobile systems are having a major impact on business and society today. Accordingly, mobile applications now form an important component of marketing

  Information system staff members can afford to employ

How many Information system staff members do you think Reliable can reasonably afford to employ? What mix of skills would they require?

  Do you believe that all data should be encrypted

Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel

  Sql data definition language and base tables with data

Create a base table. Write the SQL to create a table based on one of your entities. Be sure to identify the primary key as part of your SQL syntax

  Explain some of the hardening methods of entry control

What are protective barriers, and what should they entail? Describe and explain some of the hardening methods of entry control.

  Write a binary search tree method taht takes two keys

Write a binary search tree method that takes two keys, low and high, and prints all elements X that are in the range specified by low and high.

  Cyber insurance coverage

Some people think Lloyd's of London is the best place to go for cyber insurance coverage. Do you agree?

  Case of successful digital transformation

Digital transformation is the profound change in business activities, processes, competencies, and models to fully leverage customers at every touch-point.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd