Overview of your concerns from the risk assessment

Assignment Help Computer Engineering
Reference no: EM133370244

Case: You work as an Information Technology Consultant for the Greater Washington Risk Associates (GWRA) and have been asked to write professional memo to one of your clients as a follow-up to their recent risk assessment (RA). GWRA specializes in enterprise risk management for state agencies and municipalities. The county of Anne Arundel, Maryland (the client) hired GWRA to conduct a risk assessment of Odenton, Maryland (a community within the Anne Arundel County), with a focus on business operations within the municipality. 

Your supervisor has asked that the memo focus on Odenton's information systems, and specifically, securing the processes for payments of services. Currently, the Odenton Township offices accept cash or credit card payment for the services of sanitation (sewer and refuse), water, and property taxes. Residents can pay either in-person at township offices or over the phone with a major credit card (American Express, Discover, MasterCard and Visa). Over the phone payment involves with speaking to an employee and giving the credit card information. Once payment is received, the Accounting Department is responsible for manually entering it into the township database system and making daily deposits to the bank. The purpose of the professional memo is to identify a minimum of three current controls (e.g., tools, practices, policies) in Odenton Township (either a control specific to Odenton Township or a control provided by Anne Arundel County) that can be considered best practices in safe payment/data protection. Furthermore, beyond what measures are currently in place, you should highlight the need to focus on insider threats and provide a minimum of three additional recommendations. 

The Chief Executive for Anne Arundel County has asked for specific attention be paid to insider threats, citing a recent article about an administrator from San Francisco (see Resources). Anne Arundel County wants to understand insider threats and ways to mitigate so that they protect their resident's personal data as well as the County's sensitive information. These are threats to information systems, including malware and insider threats (negligent or inadvertent users, criminal or malicious insiders, and user credential theft). 

write Professional Informational Memo to the Chief Executive for Anne Arundel County that addresses the following.

Risk Assessment Summary: Provide an overview of your concerns from the risk assessment report. Include broad 'goal' of the memo, as a result of the risk assessment, the broad recommendations. Specific Action Steps will come later. The summary should be no more than one paragraph.

  • Background: Provide a background for your concerns. Briefly highlight why the concerns are critical to the County of Anne Arundel and Odenton Township. Clearly state the importance of data security and insider threats when dealing with personal credit cards. Be sure to establish the magnitude of the problem of insider threats.
  • Concerns, Standards, Best Practices: The body of the memo needs to justify your concerns and clarify standards, based on the resources listed below, at minimum. The PCI DSS standards are well respected and used globally to protect entities and individual's sensitive data. The body of the memo should also highlight three current controls that are considered best practice; that is, you should highlight the positive, what is currently in place, based on the risk assessment.
  • Action Steps: Provide a conclusion establishing why it is important for Anne Arundel County to take steps to protect residents and county infrastructure from insider threats based on your concerns. Recommend a minimum of three (3) practical action steps, including new security controls, best practices and/or user policies that will mitigate the concerns in this memo. Be sure to include cost considerations so that the County is Professional Memo 3 getting the biggest bang for the buck. The expectations are not for you to research and quote actual costs, but to generalize potential costs. For instance, under the category of physical security, door locks are typically less expensive than CCTV cameras.

Reference no: EM133370244

Questions Cloud

Develop security procedures refer to the ozcazual security : Develop Security Procedures Refer to the OzCazual security policy shown in "Appendix A" below and recommend improvements in each of the following five
What are the signs and symptoms of chronic obstructive : What are the signs and symptoms of chronic obstructive pulmonary disease (COPD). What are the treatment options, prognosis, and recommendation for lifestyle
Read the article cardiovascular disease mortality : Read the article "Cardiovascular Disease Mortality in New York State: NYS Department of Health". The Executive Summary of this article makes the following
Discuss how lowering cutoff value relates to changes : add more cutoff values in between the specified intervals to see changes. Discuss how lowering (or raising) cutoff value relates to changes of accuracy
Overview of your concerns from the risk assessment : IFSM 201 University of Maryland Provide an overview of your concerns from the risk assessment report. Include broad 'goal' of the memo, as a result of the risk
Discuss how the 4 ts of risk control : Discuss how the 4 Ts of risk control (i.e., transferring risk, tolerating risk, treating risk, and terminating risk) might be applied to mitigate risk.
Is plastic surgery healthy for the body : Is plastic surgery healthy for the body?
Add a playgame method to the cardwars class : Add a PlayGame method to the CardWars class. It should have 3 parameters: List for the cards, List for the high scores, and a string for the name of the high
Name and describe the health service organization : Name and describe the health service organization. Define its product/service background. Describe its primary target market in terms of the segmentatio

Reviews

Write a Review

Computer Engineering Questions & Answers

  Decision analysis using decision tables

CSE4DSS - Decision Support Systems and What would their decision be if they were to choose the alternative with the greatest expected value? Show all calculations, and justify your answer.

  Create a program that can convert dollars to yen

If the $dollar value is greater than 0, create a menu that will allow user to select Yen, Euro, Peso, or all Currency conversion.

  Define what are the threats to networks

Why networks are venerable to attacks. What are the threats to networks

  How suitable are the choices and deployment of the colours

How suitable are the choices and deployment of these colours? If they are not, what do you think they should have been? Go through the set of ‘Influencing.

  Which ni data accusation sampling method would you use

Which NI Data accusation sampling method would you use if you want to return twenty-five sampling with each read with each sample

  The working mechanism of ransomware

The security remains a challenge in networked information systems. One of the fastest evolving malware is ransomware.

  How the dataset table adapter and a data grid object are use

Explain how the dataset, table adapter, and a data grid object are used to update a database.

  How itpm best practices can align the it portfolio

Explain how ITPM best practices can align the IT portfolio with business requirements in order to create the greatest possible value for the organization.

  Implementation of a small business information system

ITECH7201 Software Engineering: Analysis and Design - Understand the significance of detailed project planning and control, good communication and documentation

  What is complementing and why is it important

What is complementing and why is it important? How many bytes are in a kilobyte, megabyte, gigabyte, terabyte, and petabyte?

  Create android base tcp socket client that connect to tomcat

Create an Android based TCP socket client that connects to Tomcat (or any other TCP server on a desktop) and downloads a large file.

  Write an algorithm for shell sort and study its performance

Write an algorithm for Shell Sort, study its performance, and compare the result with the performance of Insertion Sort.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd