Reference no: EM13782201
In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.
After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.
Write a four to five (4-5) page paper in which you:
For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.
For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.
Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.
Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).
Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.
Science of psychology differs from other scientific fields
: How do you think the science of psychology differs from other scientific fields; for example, biology? How do the steps of the scientific method ensure reliability for a psychologist's findings about human behavior?
|
Databases can grow in data structure and data capacity
: Databases can grow in data structure and data capacity throughout time. At certain times, it is necessary to perform optimization techniques in order to ensure optimal performance of the database.
|
About raise negotiation
: What are your sources of power?
|
Individuals regarding positions in society
: Using the textbook and the Online Library, write a 1500-word paper using APA standards that focuses on the following: Interview two different individuals regarding their positions in society. Analyze their responses regarding:
|
Explain in detail why the risk management is important
: After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization.
|
Curriculum barrier case study
: Explain how each instruction strategy and instructional technology device fit into the TPACK framework. Explain how safe, legal, and ethical use of digital information and technology, including the respect for copyright, intellectual property, and ..
|
Opinion of fascism-national socialism
: What is your opinion of fascism, national socialism, or state socialism, depending on where you live, and why do you have that opinion? Do you think you will join one of these movements, why or why not? Where do you hope your country will be in a ..
|
How can public interest be achieved by public administrators
: What is public interest and how can public interest be achieved by public administrators. Explain why collaboration is important for effective public management in the 21st century
|