Perform a risk assessment and threat identification

Assignment Help Management Information Sys
Reference no: EM131673786

STRUCTURED EXTERNAL ASSIGNMENT

Every organization is faced with some kind of risk or threat that could cause an interruption to the organization's operations. These risks and threats can be internal or external.

To prepare for these events, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects. Performing a risk assessment is one of the most important steps in the risk management process.

A Risk Assessment is periodic assessment of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization.

Many organizations perform risk assessments to measure the amount of risks that could affect their organization, and identify ways to minimize these risks before a major disaster occurs.

In this paper the student must identify the risks and potential effects associated with the areas of the organization pertaining to security and disaster recovery.

Please be sure to include the following:

· Introduction of the organization

· Overview of the IT department and personnel

· Discuss the occurrence or breach or disaster that has happened.

· Perform a risk assessment and threat identification section for the organization that you have chosen, as outlined in CHAPTER 2, 7, 8, and 9 in RISK ANAYSIS AND THE SECURITY SURVEY.

This section should point out the organizations weaknesses or vulnerabilities. This will be your hypothesis as to why the breach or disaster has occurred.

· Create a response plan as identified in Chapter 14 of RISK ANAYSIS AND THE SECURITY SURVEY.

· Be detailed in your response plan as this will be the most critical part of your paper. You can create your own response plan even if the organization has its own plan. This plan will be in direct response to remedying the issues that were caused by the breach or disaster.

Structure:

· No less than 7 pages

· Must be your own work not a group activity

· No plagiarism

· APA format

· Master's level work expected

· Correct punctuation, spelling, and grammar are essential.

· Must have a cover page with course name, student's name, date, and title of paper.

· Pages must be numbers.

Please remember the following:

Double spaced

12 pt

1 inch margins

Proper grammar

Run your paper through a plagiarism checking site

Please complete your own work do not copy and paste from any other source

7 page minimum NOT COUNTING TITLE PAGE, REFERENCE SECTION, TABLE OF CONTENTS

Number your pages

Title page should have the course number and name, your name, date, and title of your paper

Please make sure to do the following:

Research an organization,

Discuss the organization size, hardware, software, it department, personnel, the incident that took place, complete a disaster recovery plan, or a business continuity plan, or complete a risk assessment and analysys.

You can use any and all of the lessons and items learned in class to complete your paper.

Attachment:- Chapters (10-10-17).rar

Reference no: EM131673786

Questions Cloud

By how much are profits underestimated : Suppose sales revenues exceed the estimated amount on the income statement by $1,500,000. Without preparing a new income statement.
Describe the australian governments ism and pspf : Describe the Australian Government's ISM and PSPF with particular emphasis on information classification.
Application process of several potential sponsors : Explain the sponsorship criteria and application process of several potential sponsors for an event.
Which firm has the higher economic value added : Which firm has the higher economic value added? Which has higher economic value added per dollar of invested capital?
Perform a risk assessment and threat identification : Identify the risks and potential effects associated with the areas of the organization pertaining to security and disaster recovery.
Compute the additional profit that tensing would earn : Compute the contribution margin ratio. Using that ratio, compute the additional profit that Tensing would earn if sales were $37,000 more than expected.
Calculates the total cost of ownership of each machine : Calculates the total cost of ownership of each machine. Based on the TCO calculation, specify which model you recommend purchasing.
About the personal ethics : Review the list of possible personal ethics scenarios presented below. Pick three of these scenarios, and conceptualize how you might resolve the issue.
Compute the margin of safety in units : Compute the additional operating income that Jellico would earn if sales were $50,000 more than expected.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd