Identify Risk and Assess Risk and Define Risk Appetite

Assignment Help Basic Computer Science
Reference no: EM133124030

Part 1: Prepare for Risk Management ("Establish a Framework for Managing Risk")

1. List the corporate requirements (i.e., standards, laws) associated with the company. Briefly explain the impact of non-compliance.

2. Develop categories and a classification method for company information systems. List at least eight categories for various people, processes, hardware, software, and data applicable to the company. Describe the data/system classification scheme as well as the reasons for selecting it.

Part 2: Identify Risk ("Where is the Risk to My Information Assets")

1. List a minimum of 20 assets (data, systems, people, processes, etc.) and measure their value to the company (Low, Moderate, High, Critical) in a simple table.

2. In one column, identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity (i.e., Business Impact Analysis).

Part 3: Assess Risk ("How Severe is the Risk to My Information Assets")

1. Identify, measure (quantitative and qualitative), and mitigate key information technology risks. In addition, describe each of the tasks associated with risk framing, assessment, response and monitoring. Refer to risk models (e.g., "Managing Information Security Risk").

2. Select the optimal risk assessment methodology based on corporate needs. Compare the advantages/disadvantages of your selected risk assessment methodology to others used in the industry.

3. Provide a diagram of the matrix that was used to assess risk.

4. Define for each asset the potential threats, the likelihood the threat will occur or be successful, and the impact loss the asset will have on the company (Risk Mitigation Economics). Note: This includes disasters, loss of power, employee resignations, system malfunctions, drop-in customers, etc.

5. Using the vulnerability scan, list in a table a minimum of 15 identified threats (open vulnerabilities) to the information systems, the impact of the exploited vulnerability, and remediation steps (countermeasures) to remove or reduce either impact or likelihood from threat.

Part 4: Define Risk Appetite ("How Much Risk is Acceptable to My Organization")

1. Review the characteristics of a risk appetite within Chapter 6 of the course text.

2. Establish a Risk Appetite Statement for the company.

3. Define the Risk Tolerance of the company.

Part 5: Control Risk

1. Identify and describe the Risk Control Strategy adopted by the company. Ensure the strategy is in alignment with corporate requirements (standards, laws, frameworks, security policies, etc.) and risk appetite.

Reference no: EM133124030

Questions Cloud

Compute a sample proportion for the responses : Alex Hamilton founded Hamilton Marketing Services after leaving a major marketing consulting firm in Chicago. Compute a sample proportion for the responses
What type of short run equilibrium : Suppose that the economy is experiencing high inflation and reduced purchasing power with high demand.
What is the current bond price : The bonds make semiannual payments. If the YTM on these bonds is 5.9%, what is the current bond price
Data definition language and data manipulation language : Describe the difference between Data Definition Language (DDL), Data Manipulation Language (DML), Data Control Language (DCL),
Identify Risk and Assess Risk and Define Risk Appetite : Identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity.
International categorization of diseases : The International Categorization of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM) is a classification and coding system
Define bandwidth and impact of mismanagement : What is change control and why does it need to be managed? Give two examples of the impact of mismanagement. Define bandwidth.
Characteristics of anomaly detection : What are the characteristics of anomaly detection? Compare and contrast proximity and clustering-based approaches.
Analyze asymmetric and symmetric encryption : You will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss the web interoperability including its advantages

Discuss the web interoperability including its advantages.

  Calculate access time when there is cache miss

Calculate the access time when there is cache miss? Suppose that cache waits until line has been fetched from main memory and then re-executes for a hit.

  Write lex input file that will produce scanner

Write Lex input file that will produce scanner that capitalizes all comments in C program. Write rule in Lex to print integer numbers that are multiple of five.

  Uml class diagram based on the following requirements

Create you help me make a UML Class diagram based on the following requirements. An organization has been entrusted with developing a system that maintains

  How economists measure productivity

Discuss in detail how economists measure productivity. Detail traditional financial methods used to evaluate investment decisions including present value

  What is double d after tax cost of debt

DoubleD believes it could issue new bonds at par that would provide a similar yield to maturity. If its marginal tax rate is 35%.

  When a customer during the negotiation process

When a customer during the negotiation process is able to get the vendor to accept a clause such as Guarantee of reliability and exercise of due professional care, what does that mean?

  Represent this data with a matrix

Adita is trying to decide where to go on vacation. He prefers not to fly, so he wants to take a bus or a train. The table below shows the round-trip fares for trips from his home in Kansas City, Missouri to various cities. Represent this data with..

  Human-induced climate change remains controversial topic

Human-induced climate change remains a controversial topic with a lot of misinformation on both sides of the political spectrum.

  Calculate roa with changes and without changes

Calculate ROA with changes and without changes? (Round your answers to 2 decimal places.)

  Can the problem be solved during context-sensitive analysis

Can the problem be solved during context-sensitive analysis?

  How many effective unique keys does the playfair cipher have

how man ypossible keys does the playfair cipher have?ignore the fact tha some keys might produce identical encription result.express your ansewr as an pproximate power of 2.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd