Possible threats and vulnerabilities

Assignment Help Computer Engineering
Reference no: EM133337950

Question: You have been hired as the CISO of a new company that is composed of several smaller companies purchased through acquisitions. As the CISO of the new combined company you must develop an information security risk management plan.

Your plan should include the following: 
• Purpose of the plan, background and overview of key risk concepts 
• The choice of a framework, its advantages and why at least 2 other frameworks were not chosen 
• Possible threats and vulnerabilities 
• The plan to conduct an information security risk assessment of the new company 
• The risk response plan 
• Choice and implementation of controls to include possible frameworks and sources for controls 
• The plan to measure inherent and residual risk 
• Testing of controls, testing types and recommended frequencies based on best practices

Reference no: EM133337950

Questions Cloud

How can teamwork support security awareness : How can teamwork support security awareness and ensure everyone is aware of their role in keeping the company secure?
What environment would you want to consider : What environment would you want to consider deploying either one of these services? Is there a chance that it would not be a good idea to go either route
What does new york require? does the addendum have gaps : What does New York require? Does the addendum have gaps? Where? Draft the provisions you would use to close those gaps.
Discuss business intelligence and data warehousing processes : Using business intelligence (BI) and data warehousing processes, list at least 5 major steps in the implementation process.
Possible threats and vulnerabilities : Purpose of the plan, background and overview of key risk concepts and The plan to conduct an information security risk assessment of the new company
Evaluate the best practices surrounding cybersecurity : I need help creating a report that evaluates the theories, principles, and best practices surrounding cybersecurity and security awareness training programs.
How does a functional organization impact project manager : How does a Functional organization impact the project manager, project team, and project? Why is this important?
Evaluate the deployment of a user-centered system : In this project, you will demonstrate your mastery of the following competency: Evaluate the design and deployment of a user-centered system.
What premium will be charged based on the above formula : What premium will be charged based on the above formula? Is this premium fair, or is it overpriced based on the firm's correct claiming strategy?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a webpage to gather information for a national survey

Working for a data gathering company, you are asked to create a webpage to gather information for a national survey.

  Describe briefly one federal law related to privacy

You got hired as an IT security manager at the Sunshine Hotel and you have been asked by the general manager to conduct a presentation about data privacy.

  Write a getter method and a setter method for age

Suppose you have a class called Movie. Write a constructor for the class that initializes the title and director instance variables based on parameters passed.

  What were the design goals of the tera computer

What were the design goals of the Tera computer? Explain the sparse 3D torus used in Tera. What are the advantages of the sparse structure?

  Define the spirit of the recursion theorem of a program

define the spirit of the recursion theorem of a program.

  Discuss what is the nist and fisma

Discuss in 500 words or more the relationship between NIST and FISMA. It is important that you use your own words, that you cite your sources, that you comply.

  Describe the analytics as a service

Cloud Computing , Block Chain and OLAP. Search the internet and find scholarly content.

  Questionthink about pros and cons of societys increasing

questionthink about pros and cons of societys increasing reliance on data. what happens if computer-generated

  Difference between encapsulation and information hiding

define the difference between encapsulation and information hiding. In addition, I need to explain the role both of these concepts play in helping to make designs more robust and extensible.

  Write a function named filteronmax that takes a queue

Write a function named filterOnMax that takes a queue of integers and an integer value named max as parameters and returns a new queue of integers that contains only the values in the original queue that are less than or equal to the value of max.

  Describe the potential risks of alert fatigue in ehr systems

What was one cause in the delay in the completing of the Denver Airport. Describe the potential risks of alert fatigue in EHR systems.

  Write a program in java using swing to make a car moving

Write a Program in Java using Swing to make a car moving, and modify the animation program to make the moving shape reappear on the left-hand side.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd