Organizational risk appetite and risk assessment

Assignment Help Basic Computer Science
Reference no: EM131037993

Organizational Risk Appetite and Risk Assessment

Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization has seen reports of malicious activity on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. The CIO has asked you to prepare a short document before your team begins working. She would like for you to provide an overview of what the term "risk appetite" means and a suggested process for determining the risk appetite for the company. Also, she would like for you to provide some information about the method(s) you intend to use in performing a risk assessment.  

Write a two to three (2-3) page paper in which you:

  1. Analyze the term "risk appetite". Then, suggest at least one (1) practical example in which it applies.
  2. Recommend the key method(s) for determining the risk appetite of the company.
  3. Describe the process of performing a risk assessment.
  4. Elaborate on the approach you will use when performing the risk assessment.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the components and basic requirements for creating an audit plan to support business and system considerations.
  • Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131037993

Questions Cloud

Project work breakdown structures : Project Work Breakdown Structures (WBS) play an important role when defining the scope of a project and developing a project schedule. Describe the purpose of a WBS, how you would develop one, and why it is so important to develop before creating a p..
How do utilize social media personally and professionally : How do you utilize social media personally and professionally? Do you feel it is effective in marketing? If so, provide a specific example.
Find the free length of the spring : If the length of each spring is 120 mm when the radius of the spring is 70 mm and the equilibrium speed is 360 r.p.m, find the free length of the spring. If the radius of the rotation increases to 120 mm, what will be the corresponding percentage ..
Changing the basic motivational function of attitudes : One way in which marketers aim to change attitudes toward their brands is through changing the basic motivational function of attitudes: utilitarian; ego-defensive; value-expressive; knowledge. List and discuss what two of these functions mean and ho..
Organizational risk appetite and risk assessment : Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization has seen reports of malicious activity on the rise and has become extremely concerned wit..
Describe the attitude-toward-the-ad model : Describe the attitude-toward-the-ad model. State a minimum of three facts about the model. Describe how a person’s attitude toward a brand of your team’s choice (name the brand) was formed, based on what this model says about attitude formation.
Find the range of speed of the gonernor : In addition, there is an equivalent constant inward radial force of 80N acting on each revolving mass in order to allow for the dead weight of mechanism - find the range of speed of the gonernor.
Prevent the revolution and the fall of the monarchy : Given their fundamental differences, why did communism and fascism have such similar outcomes in the middle third of the twentieth century? What forces at work in Western civilization caused their high ideals to produce such nightmarish results
Preventing or mitigating dos or distributed dos : The course module #4 covers very important concepts of how Denial of Service (DoS) attacks work. However, the module does not discuss detection, prevention, or mitigation of DoS attacks (or Distributed DoS). The task of this individual assignment ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  One function is use to calculate inflation rate for current

1.One function is use to asks the user to enter the current price of an item and it's one year. 2.One function is use to calculate inflation rate for current year.

  Advantages of control structures with arrays

Describe some of the advantages of using repetition control structures with arrays. Provide an example to support your stated advantage.

  Elements in the current row and column

The value of the selected position is added to the player's score, and that position becomes the current position and cannot be selected again. Players alternate until all grid elements in the current row and column are already selected, at which ..

  Create a base class to store characteristics about a loan

Create a base class to store characteristics about a loan. Include customer details in the Loan base class such as name, loan number, and amount of loan. Define subclasses of auto loan and home loan.

  Describe the international scope of threat

Name of the threat description when and where it occurred risk likelihood and risk impact, How the threat attacks the system

  Video memory is needed to store picture as true color image

how much memory is required to store the picture? How much video memory is required to store the picture as a ''true color'' image, at 3 bytes per pixel?

  Use a recursive function, instead of nested for loops

Write a C program that will prompt the user to enter an integer and then it will print on the screen all the binary numbers of length n, where n is the integer variable inserted by the user.

  Object-oriented design to design a parent class called book

Use object-oriented design to design a parent class called Book that will receive the ISBN, author, title and price of a book, and select and print records for all books with a price of more than $50.00. Design a child class called TextBook th..

  Obtained in your contextual inquiry

Overview of your informant and their work. Give some brief description about the setting, objects and people in the environment, goals of the work, and so forth. (Do not include people's real names, but job titles are okay.) [150 - 250 words]

  What is the size of the esp payload?

What is the size of the ESP payload?

  What upgrade options exist for moving from server

1. What upgrade options exist for moving from Server 2008 (R2) to Server 2012?  What limitations or caveats should be considered when upgrading? Would you typically recommend a clean install or an in-place upgrade when attempting to move a service fr..

  Basic activities of information systems

What are the 5 competitive forces in the market (illustrate via an example). How would a company use competitive strategies to address specific competitive forces?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd