Identify Risk and Assess Risk and Define Risk Appetite

Assignment Help Basic Computer Science
Reference no: EM133124030

Part 1: Prepare for Risk Management ("Establish a Framework for Managing Risk")

1. List the corporate requirements (i.e., standards, laws) associated with the company. Briefly explain the impact of non-compliance.

2. Develop categories and a classification method for company information systems. List at least eight categories for various people, processes, hardware, software, and data applicable to the company. Describe the data/system classification scheme as well as the reasons for selecting it.

Part 2: Identify Risk ("Where is the Risk to My Information Assets")

1. List a minimum of 20 assets (data, systems, people, processes, etc.) and measure their value to the company (Low, Moderate, High, Critical) in a simple table.

2. In one column, identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity (i.e., Business Impact Analysis).

Part 3: Assess Risk ("How Severe is the Risk to My Information Assets")

1. Identify, measure (quantitative and qualitative), and mitigate key information technology risks. In addition, describe each of the tasks associated with risk framing, assessment, response and monitoring. Refer to risk models (e.g., "Managing Information Security Risk").

2. Select the optimal risk assessment methodology based on corporate needs. Compare the advantages/disadvantages of your selected risk assessment methodology to others used in the industry.

3. Provide a diagram of the matrix that was used to assess risk.

4. Define for each asset the potential threats, the likelihood the threat will occur or be successful, and the impact loss the asset will have on the company (Risk Mitigation Economics). Note: This includes disasters, loss of power, employee resignations, system malfunctions, drop-in customers, etc.

5. Using the vulnerability scan, list in a table a minimum of 15 identified threats (open vulnerabilities) to the information systems, the impact of the exploited vulnerability, and remediation steps (countermeasures) to remove or reduce either impact or likelihood from threat.

Part 4: Define Risk Appetite ("How Much Risk is Acceptable to My Organization")

1. Review the characteristics of a risk appetite within Chapter 6 of the course text.

2. Establish a Risk Appetite Statement for the company.

3. Define the Risk Tolerance of the company.

Part 5: Control Risk

1. Identify and describe the Risk Control Strategy adopted by the company. Ensure the strategy is in alignment with corporate requirements (standards, laws, frameworks, security policies, etc.) and risk appetite.

Reference no: EM133124030

Questions Cloud

Compute a sample proportion for the responses : Alex Hamilton founded Hamilton Marketing Services after leaving a major marketing consulting firm in Chicago. Compute a sample proportion for the responses
What type of short run equilibrium : Suppose that the economy is experiencing high inflation and reduced purchasing power with high demand.
What is the current bond price : The bonds make semiannual payments. If the YTM on these bonds is 5.9%, what is the current bond price
Data definition language and data manipulation language : Describe the difference between Data Definition Language (DDL), Data Manipulation Language (DML), Data Control Language (DCL),
Identify Risk and Assess Risk and Define Risk Appetite : Identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity.
International categorization of diseases : The International Categorization of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM) is a classification and coding system
Define bandwidth and impact of mismanagement : What is change control and why does it need to be managed? Give two examples of the impact of mismanagement. Define bandwidth.
Characteristics of anomaly detection : What are the characteristics of anomaly detection? Compare and contrast proximity and clustering-based approaches.
Analyze asymmetric and symmetric encryption : You will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd