Develop strategies to mitigate risk

Assignment Help Management Information Sys
Reference no: EM131819403 , Length: 5

Assignment : IT Risk: Analyzing Personal and Business Vulnerabilities

Large organizations are not the one ones susceptible to threats of potential privacy and data security breaches. Individuals are also prone to vulnerabilities that may result in attacks and identity theft.

The evoluation of the Internet has resulted in an exponential growth in exploits, malware, and other types of attacks for both individuals and for e-Commerce. Imagine that you are an IT professional and Web application developer for a retail company.

Part of your job entails anticipating potential risks and develop strategies to mitigate them.

Write a three to five (3-5) page paper in which you:

Explain the major effects that the advancement of technology has provided to businesses in relation to opportunities for more efficiency, collaboration, and distributed resources.

Note: Be sure to include how the security landscape has changed.

Analyze the major differences between the types of threats and vulnerabilities that exist between personal use and business use of the Internet.

Suggest two (2) ways that you would incorporate perimeter defense into a risk management plan.

Your retail organization has decided to do internal Web hosting. Assume that your Website is mission critical. Speculate on the top five (5) anticipated Website attack risks. Provide specific mitigation strategies to address each risk.

Use at least four (4) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality references.

Format your assignment according to the following formatting requirements:

Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Analyze the impact of the Internet and Web applications on the business world.

Analyze common Website attacks, weaknesses, and security best practices.

Use technology and information resources to research issues in securing Web-based applications.

Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions.

Reference no: EM131819403

Questions Cloud

Determine which three attacks you want to include : Determine which three (3) attacks you want to include in your presentation and provide a brief description of each.
How to report accounts receivable on the balance sheet : Applying the allowance method (percent-of-sales) to account for uncollectibles During its first year of operations, Fall Wine Tour earned net credit sales.
Financial futures market to offset interest rate risks : What is meant by "hedging in the financial futures market to offset interest rate risks"?
What is the amount of discount on these bonds at issunace : What is the amount of the discount on these bonds at issunace
Develop strategies to mitigate risk : Explain the major effects that the advancement of technology has provided to businesses in relation to opportunities for more efficiency, collaboration.
Applying the allowance method to account : Applying the allowance method (percent-of-receivables) to account for uncollectibles. The Accounts Receivable balance for Lake, Inc. at December 31, 2015.
Offered contract to produce part for new printer : Your factory has been offered a contract to produce a part for a new printer. What does the NPV rule say you should? do?
Prepare the journal entries that should be made : Prepare the journal entries that should be made in 2010 and 2011 to record the transactions related to the premium plan of the Sycamore Candy Company
Marginal social costs : If, at a given level of output, marginal social benefit is greater than marginal social costs, then: a) Social surplus will increase if quantity increases

Reviews

Write a Review

Management Information Sys Questions & Answers

  The increasing use of intranets and extranets in business

What potential security problems do you see in the increasing use of intranets and extranets in business?

  Discuss data classification and visualization assessment

In this project, you are either work on the hypothetical company or an existing company. Discuss Data Classification and Visualization Assessment.

  What is meant by digital government services

What is meant by "Digital Government services?" (previously called "e-Government" services) Where have past administrations fallen short in protecting Digital Government / e-Government services?

  Identify the line codes that have minimum average energy

Identify the line codes that have minimum average energy and those that do not. Compare your answers with the observations made on these line codes.

  Discuss the role of information systems in business

Explain how one/all these different systems server the various levels of management in your organization and discuss the role of Information Systems in business.

  Explain the risk level of e-commerce vs regular commerce

Explain the advantages and disadvantages and risk level of e-Commerce vs regular commerce.

  Supply chain management redesign

Supply Chain Management Redesign - Why does the Supply Chain Management process needs too be redesigned?

  Analyze costs and schedules with regard to deliverables

From the first and second e-Activities, select one (1) tool that you would use in order to analyze costs and schedules with regard to deliverables and / or work packages for a project of your choice

  Describe what hacking of memory or hacking of ram

Write two to three(3) page paper in which you: Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

  What single factor will impact all business more than is

On the other hand, what single factor will impact all business more than IS? And, isn't knowl- edge and proficiency with IS and IT key to future employment and success?

  Description of the purpose of prototyping

A description of the purpose of prototyping within the example in the chosen article CSU requires that students use the APA style for papers and projects. Therefore, the APA rules for formatting, quoting, paraphrasing, citing, and listing of sourc..

  How advances in information technology have changed

Read, Improving the Efficiency, Accuracy, And Cost Effectiveness of Core Business Activities and distinguish how advances in information technology have changed the way businesses are conducted.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd