Inventory all your computer equipment

Assignment Help Computer Engineering
Reference no: EM131225546

Module Risk Assessment Report

In order to determine the assets and resources that most need protecting with available funding, a risk assessment must be completed.

In order to successfully complete this assignment:

1. Inventory all your computer equipment. (Include printers, scanners, monitors, iPads, smart phones, keyboards, etc. EVERYTHING)

2. Inventory all your software.

3. Inventory all data saved on all your devices. Some examples are:

a. Contacts
b. School files (homework, papers, etc)
c. Tax documents
d. Banking information
e. Photos
f. Music and movies
g. Any other files/data

4. In a Word document, list the data collected in numbers 1-3. Make a section for each. (e.g. Hardware would be one section.)

5. Decide which of the items are most important to you. In other words, which ones would cause the most grief, pain, aggravation or money if lost?

6. Decide which items you can easily replace. This can mean the least inexpensive to replace or those than can easily be recreated.

7. In the Word document with the inventory, create another section titled "Assessment". In this section describe which items are most important to you and why. Also, describe the items mostly easily replaced and why. Sometimes the most important are part of the easiest to replace. For example; a smartphone may be the most important but also the easiest to replace because it is insured.

8. Create a section in the same document titled "Priorities". In this section, list in order of priority the items that you feel you should apply the most stringent security measures.

This exercise will assist you in completing the risk assessment for the final project. In this exercise it assumed that money is not an object when it comes to protecting IT assets. In the final project, the same assumption holds. Note that in the real world, budget plays a major role in determining security measures.

Reference no: EM131225546

Questions Cloud

Calls per day required by sales force to break even : If they have an average revenue of $70 per sale and they only sellone in five customers, what would be the required sales level, number of sales and calls per day required by the sales force to break even?
Write a cpp program to find fibonacci numbers : Only one program, Write a C++ Program to Find Fibonacci Numbers using Dynamic Programming.
Calculate the market value-weighted index value : 1. What happened for stock C during this period? 2. Calculate the price-weighted index value at time 0 and at time 1 assume the divisor for time 1 is 2.35. 3. What is the rate of return if you use price-weighted method? 4. Calculate the market value-..
What is the present worth of the annual disbursements : The maintenance costs associated with a machine are $2,000 per year for the first ten years, and $1,000 per year thereafter. The machine has an infinite life.
Inventory all your computer equipment : Create a section in the same document titled "Priorities". Inventory all your computer equipment. (Include printers, scanners, monitors, iPads, smart phones, keyboards, etc. EVERYTHING)
Company equity multiplier : Norton Company has a debt-to-equity ratio of 1.18, ROA of 12.23 percent, and total equity of $1,484,000. What are the company's equity multiplier, debt ratio, and ROE? (Round answers to 2 decimal places, e.g. 12.55 or 12.55%.)
Inventory turnover ratio and days : Sorenson Inc. has sales of $4,056,000, a gross profit margin of 38.55 percent, and inventory of $1,139,000. What are the company's inventory turnover ratio and days' sales in inventory? (Round inventory turnover ratio to 3 decimal places, e.g. 12...
Return on the market portfolio : Assume that the risk-free rate is 3.8 percent. If a stock has a beta of 0.8 and a required rate of return of 11.5 percent, and the market is in equilibrium, what is the return on the market portfolio?
Expected return and standard deviation : What is the expected return and standard deviation on the companys stock?

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to calculate the area of a circle

Your employer has requested the development of a software application to compute the area of a circle. The application must accept only one value (i.e., the radius), and it must display the result in decimal value.

  Determines the largest number stored in the file

Design a program that determines the largest number stored in the file.

  Recognize and explain at least two forms of fraud

today there are many industries that remain vulnerable to electronic fraud. for this assignment you will need to

  What can be done to enhance the security of business uses

question 1 what can be done to improve the security of business uses of the internet? give several examples of security

  How your architecture approaches the concepts

Pick an architecture. Do research to find out how your architecture approaches the concepts introduced in this chapter. For example, what representation does it use for negative values?

  A palindrome consists of a word or deblanked

A palindrome consists of a word or deblanked, unpunctuated phrase that is spelled exactly the similar when the letters are reversed. Write a recursive function that returns a value of 1 if its string argument is a palindrome.

  Please simplify the expression by k-map

Please simplify the expression by applying the theorem/identities. After finishing the simplification, try to use K-map to verify your result. You must show how you grouped the cells when working on K-map

  Intersection of the row and column

The cell formed by the intersection of the row and column contains two ciphertext characters. What constraint must the matrix adhere to and how many keys are there?

  Complexity and crafting a solution

You're faced with an extremely complex problem that will require a lengthy solution. How would you go about addressed the complexity and crafting a solution?

  Write down some of the companies which make embedded

what are some of the companies that make embedded operating systems and are these operating systems just scaled down

  Representation in both hexadecimal and binary

Show 75 in the IEEE single precision floating point representation in both Hexadecimal and Binary. Please demonstrate the steps so I can emulate.

  Initialize the loop control variable before the program

In boy of the loop, I need to multiply the value of the loop control variable by 10 and by 100, then I want to change the value of the loop control variable in the body of loop.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd