Reference no: EM131155261
Risk Response and Recovery
In Assignment, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.
After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.
Write a four to five page paper in which you:
For each of the three or more malicious attacks and / or threats that you identified in Assignment, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.
For each of the three or more malicious attacks and / or threats identified in Assignment, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.
Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.
Draft a one page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).
Use at least three quality resources in this assignment (no more than 2-3 years old) from material outside the textbook.
Give a succinct overview of your fictitious company
: Create two (2) company introductions and develop an eight to ten (8-10) point checklist in which you: Give a succinct overview of your fictitious company. Give a succinct overview of the fictitious company merged with
|
Describe at least one cognitive-behavioral intervention
: Identify any patterns or themes in the circumstances or thoughts that follow the problematic behavior or critical event. Based on your assessment, what seems to maintain or reinforce the problematic behavior or critical event?
|
Problem regarding the budgeting and scheduling
: Time and money are key considerations for any project, or any endeavor for that matter. In reference to scheduling when planning a project, we need to define the activities and the sequence of activities, and then estimate the activity resources a..
|
How do you feel about the question is it legal to lie
: How do you feel about the question, "is it legal to lie?" Do you agree or disagree with the statement? Give an explanation for your answer using evidence
|
Explain in detail why you believe the risk management
: Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.
|
When the law was enacted
: You are to write at least a 6 page paper in APA style (6th edition) reporting on a US antitrust law. You are to report on the following information listed below:
|
How do you plan to implement career development
: How do you plan to implement career development? How will you will keep training and access to opportunities equal? How will you will increase employees' KSAs (knowledge, skills, and abilities)
|
Beer and french definition of od
: How does bechard's definition of organizational Design OD differ from Burke's, Beer's and French's definition of OD?
|
Which leadership of your chosen country has used foreign aid
: Ascertain the degree to which the leadership of your chosen country has used foreign aid to improve its health care system. Support your response with concrete examples.
|