Explain in detail why you believe the risk management

Assignment Help Basic Computer Science
Reference no: EM131000661

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

1 For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

2 For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

3 Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

4 Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

5 Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

• Explain the concepts of information systems security as applied to an IT infrastructure.

• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.

• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

• Use technology and information resources to research issues in information systems security.

 Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Reference no: EM131000661

Questions Cloud

Display the characteristics of an animal : Include a brief documentation (in the code or in a separate document) to explain the input (if any), processing and output of the program
Compare your calculations for the two companies : Calculate the gross profit ratio, the inventory turnover ratio, and the average days in inventory for the two companies using the most recent fiscal year data.
Develop forecasts using a three-period moving average : The number of cans of soft drinks sold in a machine each week is recorded below. Develop forecasts using a three-period moving average
How can electromigration be used as property for separation : How can electromigration be used as property for separation?
Explain in detail why you believe the risk management : For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain yo..
Calculate the inventory value at the end of 2011 and 2012 : Calculate the inventory value at the end of 2011 and 2012 using the dollar-value LIFO method.
Proportion of the population in favor of the proposition : An opinion poll based on a sample of 50 subjects estimated p, the proportion of the population in favor of the proposition, as 0.72.
What are the three fundamental analysis strategies : Explain the role and interests of the project champion, organizational management, and end users regarding a new system project. How will each impact the organizational feasibility of the project?
Mercury company has only one inventory pool : Compute the inventory at December 31, 2012, 2013, and 2014, using the dollar-value LIFO method.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe a system project that might have three subsystems

Describe a system project that might have three subsystems.

  Create a new custom form that contains a subform

1) You are going to create a new custom form that contains a subform, the main from will contain the classes and the subform will contain the students , when the user navigate the classes from the main form, the subform will display the students f..

  Potential vulnerabilities in making purchase with debit card

Recognoze any potential vulnerabilities in making purchase with debit card, and which area of CIA triad they apply to.

  Describe four different kinds of wireless technologies in a

bull discuss four different types of wireless technologies in a 350- to 700-word paper in apa format.bull describe the

  Construct a diagram using rationale to map the arguments

An article from the press that cover any of the given topics, for example there have been many articles in the media recently about government surveillance.

  Explaining rea modeling and rea diagrams

REA data modeling does not include traditional accounting elements such as ledgers, chart of accounts, debits and credits.

  Computer crimes directions

Computer Crimes Directions: Using the internet, research a specific case of a computer crime where a person was prosecuted for committing a computer crime. Write an essay about this crime. Your essay should include the following:Explain the computer ..

  Design a payroll class

Write the appropriate accessor and mutator methods and a constructor that accepts the employee's name and ID number as arguments.

  What are the components of pki

1. What are the components of PKI? 2. What is physical security? What are the primary threats to physical security? How are they manifested in attacks against the organization? 3. What are certification and accreditation when applied to informati..

  Mobility-cdma and gsm

discuss a minimum of three mobile web applications that are familiar or that you used regularly.

  Explain one 1 way in which a gui can take merits of

gui and multithreading please respond to the followingbull describe one 1 way in which a gui can take advantage of

  Identify people to interview to learn new training activity

Draft a project scope statement for the TIMS system and describe the constraints. She said be specific. Need to identify the people want to interview to learn more about the new training activity, and prepare a list of the questions I will ask.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd