Identify information assets and prioritize identified assets

Assignment Help Risk Management
Reference no: EM13808020

Assignment: Organizational Risk Appetite and Risk Assessment 

Imagine you have just been hired as an Information Assurance Officer and the leader of business impact analysis (BIA) and risk assessment team for a video game development company. The organization network structure is identified in the network diagram below and specifically contains:

  • 2 firewalls
  • 3 file servers
  • 1 Web / FTP server
  • 1 wireless access point (WAP)
  • 1 exchange email server
  • 100 desktop / laptop computers
  • 1 Network Intrusion Detection System (NIDS)
  • In-house PKI environment
  • 2 Windows 2008 Active Directory Domain Controllers (DC)
  • VoIP telephone system

The Chief Information Officer (CIO) has seen reports of malicious activity on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requests your help.

Write a three to five (3-5) page paper in which you:

  1. Conduct an organizational business impact analysis (BIA) and determine which information assets need to have a risk assessment performed.
  2. Conduct an organizational risk assessment and provide an initial report that includes the following:
    1. Identify information assets and prioritize identified assets.
    2. Define risks and prioritize the risks.
    3. Identify the critical asset(s) and its associated risks.
  3. Based on your BIA and risk assessment initial report, evaluate the current network and organizational requirements and complete the following:
    1. Identify one (1) risk that should be accepted by the organization. Explain why.
    2. Identify one (1) risk that should be avoided by the organization. Explain why and how it should be avoided.
    3. Identify one (1) risk that should be shared by the organization. Explain why and how it should be shared.
    4. Identify one (1) risk that should be controlled by the organization. Explain why and how it should be controlled.
  4. Identify the organization's risk appetite. Provide the organization with recommendations of where action(s) need to be planned and your approach to mitigate the risks.
  5. Explain why you have chosen the approach and how it can be completed.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13808020

Questions Cloud

Develop a java based gui application : Develop a Java based GUI application(using swing) that allows the user to enter Charity/Fund information and display them in a JTable
Research and devise a plan to thwart malicious code : Research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created deviant code
Describe the impact of telecommuting on energy conservation : Describe the impact of telecommuting on energy conservation, IT operational costs, "green computing", and shifts in telecommuters' lifestyles (e.g., parents, disability, etc.)
Identify some of the potential conflicts in this project : Explain how the data collected in the Project Stakeholders table could assist the project management team in defining the project scope. Identify some of the potential conflicts in this project. Describe how understanding influence and anticipat..
Identify information assets and prioritize identified assets : Identify information assets and prioritize identified assets. Define risks and prioritize the risks. Identify the critical asset(s) and its associated risks
Calculate bond equivalent yield and effective annual return : Calculate the bond equivalent yield and effective annual return on a jumbo CD that is 115 days from maturity and has a quoted nominal yield of 6.62 percent.
Calculate the discount yield on this treasury bill : You would like to purchase a Treasury bill that has a $15,000 face value and is 69 days from maturity. The current price of the Treasury bill is $14,875. Calculate the discount yield on this Treasury bill. (Use 360 days in a year. Do not round interm..
Using CAPM compute the cost of equity financing : ABC is a manufacturer. Long term debt, with an incremental borrowing rate of 6% Capital stock with the following information. Risk free rate 4%, market rate of return 12%, Beta 1.25. Compute the weighted average cost of capital (WACC)? Using CAPM com..
Compounded quarterly-required rate of return : BSW Corporation has a bond issue outstanding with an annual coupon rate of 8 percent paid quarterly and four years remaining until maturity. The par value of the bond is $1,000. Determine the fair present value of the bond if market conditions justif..

Reviews

Write a Review

Risk Management Questions & Answers

  Discuss the trade-off of risk

Identify a "risky" and a "safe" investment and provide rationale to justify your choices. Also, discuss the trade-off of risk and reward between your two investments.

  1 when will a bond trade at a discount par at a premium

1. when will a bond trade at a discount? par? at a premium? which bonds will be the most sensitive to changes in

  Describe the major risk factors of the disease

Select one chronic disease such as diabetes. Assume that you are working for a county public health department with staff nurses and physicians. You want to run a prevention program for this disease that focuses on one risk factor.

  Way in which the malware was utilized to steal data

From the selected e-Activity article, describe in detail the way in which the malware was utilized to steal data or gain privileged remote access to a computer or network

  Operating in complex market environments

Demonstrate an understanding of the importance of procurement for global organisations operating in complex market environments

  Create a risk assessment matrix for the purchase

Create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm

  Discuss the insurance issues that jack should consider

Jack owns a manufacturing company that regularly received deliveries of of raw material from a supplier. Discuss the insurance issues that Jack should consider in regards to these shipments.

  Discuss the risk management process

Discuss the risk management process, as it applies to the firm and identify loss types for pure risks, and for damage to assets. Discuss direct and indirect losses.

  Which aspects or areas of a project plan

Which aspects or areas of a project plan are more likely to be affected by risk responses? How do risk responses affect the different areas of a project plan? Give an example of a situation in which you believe a highly perceptible risk response plan..

  Future of cloud computing

As an accountant of the My & Say Accounting CPA firm, after reading the two articles by Drew (2012) and locating two additional peer-reviewed sources on the topic, provide an appraisal for Mr. Say.

  Discuss how the strategies are applied

Describe three that you think are the most important, and discuss how the strategies are applied and describe three that you think are the most important and discuss how the strategies are applied.

  Risk and return

Investing in the stock market and Risk-free investment and inflation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd