IT Risk Assessment Case Study

Assignment Help Management Theories
Reference no: EM131656583 , Length: word count:3000

Task:

The assessment is to deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.

Senior executives in both business and technology divisions within Aztec have collected a portfolio of projects from their respective strategists that could be potentially funded for deployment. The portfolio includes projects such as:

  • Allowing employees to bring their own devices (laptops, tablets and mobile phones for example) into the workplace to be used as their main or sole devices in achieving their work tasks.
  • Migrating business-critical applications and their associated data sources to an external Cloud hosting solution.
  • Outsourcing key IT functionality such as the network, desktop management or application development to a third party.
  • Upgrading or introducing a major technology such as mobile platforms and applications, migrating to an improved networking technology (such as IPv6), creating a corporate-wide email archive for compliance purposes, or upgrading applications and desktop operating systems.

Each of these potential projects carries significant IT risks which will need to be managed to support the business case as to whether the project should go forward. In this case study, you are the IT Risk Assessment lead at Aztek, and your role is to be the interface between business stakeholders and technologists, translating potential technical difficulties into risk language to facilitate effective decision-making by stakeholders.

For the Aztek case study you will need to select one of the projects from the list above for a thorough IT Risk Assessment. You may select another project beyond those listed above with the approval of the subject coordinator, and you may wish to select a project that is relevant to your workplace for example.

The deliverable for this Case Study is an IT Risk Assessment report, written for the intended audience of ztek management providing a risk assessment of the project you have selected to consider. The report must address the following criteria:

  • An Executive Summary at the beginning of the report which provides a clear statement of the IT technology project that is being assessed, and an overview of your recommendations to Aztek management as to the merits of the project based on your risk assessment (2 - 3 pages in length).
  • A review of the project with respect to the Financial Services sector, which would include any relevant government or industry regulation or compliance, and any established best practices (2 - 3 pages in length).
  • A review of the project impact on the current security posture of Aztec, as expressed by its current maturity against IT Security policies and procedures (3 - 5 pages in length).
  • A risk assessment based on threats, vulnerabilities and consequences derived from an IT control framework and any existing industry risk recommendations for the project. For example, there are several consortia for Cloud Computing that have created IT Risk Assessments for this technology (4 - 10 pages in length).
  • Specially address risks for Data Security from the viewpoint in the project of what data will be used, who will have access to the data and where will the data flow (2 - 4 pages in length). Include cited references.

Reference no: EM131656583

Questions Cloud

How did particular magazine article reflect to manipulate : How did this particular magazine article reflect and/ or attempt to manipulate the cultural values of its audience? How can you prove this?
Most significant conflict in personal life-work environment : Explain and analyze the issues that cause the most significant conflict in your personal life or work environment.
Which may determine and shape specific managerial approaches : which may determine and shape specific managerial approaches in international human resource management.?
Prepare correcting general journal entries : Prepare correcting general journal entries required at December 31, 2013 assuming that books have not been closed -Determine the proper balance in Allowance
IT Risk Assessment Case Study : The assessment is to deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company
Develop a new diversity policy and training series : Develop a new diversity policy and training series for your team to help employees recognize the impact of diversity in the workplace.
How valid are the points the author presents in the article : How valid are the points the author presents in this article? Consider how each claim relates to the connection between nutrition and health outcomes.
Discuss the research about intervention strategies : Review and differentiate the characteristics of the selected disorder and discuss the research about intervention strategies for the disorder.
Differentiate between the concepts of criminal law-antitrust : In your own words differentiate between the concepts of criminal law, antitrust, and health care as they apply to U.S. health law in the 21st Century.

Reviews

len1656583

9/25/2017 1:40:15 AM

Australian student, 3000+ words will be fine. Requirements: Microsoft Word document, 15 – 25 pages in length at 12 point font and single spacing. Around 3500-4000 words in length. An Executive Summary at the beginning of the report which provides a clear statement of the IT technology project that is being assessed, and an overview of your recommendations to Aztek management as to the merits of the project based on your risk assessment (2 - 3 pages in length). A review of the project with respect to the Financial Services sector, which would include any relevant government or industry regulation or compliance, and any established best practices (2 - 3 pages in length).

len1656583

9/25/2017 1:40:07 AM

A review of the project impact on the current security posture of Aztec, as expressed by its current maturity against IT Security policies and procedures (3 - 5 pages in length). A risk assessment based on threats, vulnerabilities and consequences derived from an IT control framework and any existing industry risk recommendations for the project. For example, there are several consortia for Cloud Computing that have created IT Risk Assessments for this technology (4 - 10 pages in length). Specially address risks for Data Security from the viewpoint in the project of what data will be used, who will have access to the data and where will the data flow (2 - 4 pages in length). Include cited references.

Write a Review

Management Theories Questions & Answers

  Would you recommend that an organization set bhags

Would you recommend that an organization set BHAGs? Why or why not? Identify an example of a BHAG from a real organization. Was that BHAG achieved?

  Apple to create a unique version of ios

The government asked a court to order Apple to create a unique version of iOS that would bypass security protections on the iPhone Lock screen. Apple strongly objects to this order. The government says Apple's objection appears to be based on concern..

  Empowerment improved customer service

A study of bank employees concluded that empowerment improved customer service and tended to reduce conflict between employees and their supervisors. Given this study, explain the term empowerment and identify strategies at this bank (or any workplac..

  Project ocean-the troubled water billing system

The city of Philadelphia entered into an agreement with Oracle Corporation to replace its antiquated, custom-built, 30-year-old water billing system that fails to collect all the revenue it should.

  Compare the competitive equilibrium to the nash equilibrium

The following information describes the demand schedule for a unique type of apple. This type of apple can only be produced by two firms because they OViln.

  Can the largest possible value be determined

Assume that there is evidence to suggest that only linear terms will be needed in a regression model, and there are 10 available regressors.

  Discuss the emergency management leadership theories

Outline how leadership deals with the community as part of emergency management incident process.

  Prepare a marketing plan around

Each question needs to be atleast 250 words and there needs to be atlease 2 references total. It can be common for a top-level manager to watch a single focus group and get excited about something a customer says, and prepare a marketing plan around ..

  Difference between operating profit and net income

Explain the relationship among these ratios: return on assets, operating profit margin, and total asset turnover.

  Is this a business expense to be charged to your company

After you hand your passport to the immigration officer in country X, he misplaces it. A small "donation" would certainly help him find it again. Should you give him money?

  What implied warranties arise under the ucc

What remedies are available to a seller or lessor when the buyer or lessee breaches the contract? What remedies are available to a buyer or lessee.

  Od theory for this change project

What would be the pros/cons of using OD theory for this change project?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd