How would you start a ground up risk assessment process

Assignment Help Computer Engineering
Reference no: EM133516870

Discussion Post: Governance Of Enterprise IT

You have been hired by a large public university as the lead of IT security. The university has adopted Microsoft technologies for most of the IT applications. The Chief Information Officer has asked you to create a process for IT security risk assessment reviews for all IT purchases. Respond to the following questions:

Question 1) What are some key activities that managers need to be mindful of when creating a risk assessment policy?

Question 2) How would you start a ground up risk assessment process? Who should be involved?

Question 3) What will you need to review all applications purchased for IT?

Reference no: EM133516870

Questions Cloud

Information about teacher sensitivity : Your summary should include information about Teacher Sensitivity, functional are 8 and 9 Self and Social, and temperaments.
What additional steps can be taken : The network restrictions surrounding the web authentication service is one layer of defense. What additional steps can be taken?
Members of the royal society of london : Hooke and Boyle were both members of the Royal Society of London. Founded in 1660, this Society is still active today.
What are depreciating assets : what are depreciating assets? What are the different ways to calculate the declining value of depreciating assets
How would you start a ground up risk assessment process : What are some key activities that managers need to be mindful of when creating risk assessment policy? How would you start a ground up risk assessment process?
Discuss the kinds of problems that can ruin a relationship : Classify and describe one of the following categories of people: gum chewers, doughnut eaters, cell-phone users, complainers, speakers, grocery shoppers.
How the teacher interacts with students, and supports them : how the teacher interacts with students, and supports them. You should include what you have learned by watching the videos and strategies that you think will
Perform the selected dork strings in google search engine : Perform the selected dork strings in the Google search engine and capture the information from each of dork string that you used and place it in Microsoft Word.
Describe how you typically communicate nonverbally : describe how you typically communicate nonverbally? Do you have particular or unique patterns of nonverbal communication?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make a powerpoint presentation to convey information

Give two examples where it will be appropriate to create a PowerPoint presentation to convey information to a group of people working in the field of law.

  What may cause the loss of one control file

Why must a business have its database in ARCHIVELOG mode?

  Find the sum of first n natural numbers using recursion

Write a C program to find the sum of first n natural numbers using recursion. The user inputs the value of n.

  Write an e-mail simulator that processes mail

Write an e-mail simulator that processes mail at an average of 40 messages per minute. As messages are received, they are placed in a queue.

  Create a scanner for the file and pass it to your validator

Prompt for the name of the file to be validated. Create a Scanner for the file and pass it to your validator.

  Discuss the costs of compromised data integrity breaches

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education.

  Discuss the importance of regular expressions

Discuss the importance of regular expressions in data analytics. Also, discuss the differences between the types of regular expressions.

  A function that removes all occurrences of the integer

A function (myRemove num list) that removes all occurrences of the integer num from a simple list of integers, returning list with num removed.

  Find the core dump file in your current directory

COMPSCI 70 University of California, Write C++ (or C) program that will crush (i.e. abort abnormally) with the most famous Unix/Linux error message

  Determine the criteria that must be considered to perform

define the size of the project. Determine the criteria that must be considered to perform the project sizing. Create one additional factor with a rationale.

  Write a program that asks the user for a password

Write a program that asks the user for a password and verifies that it meets the stated criteria.

  How many pages are there in virtual memory

Suppose we have 29 bytes of virtual memory and 27 bytes of physical main memory. Suppose the page size is 23 bytes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd