Problem regarding virus-spyware risk assessment

Assignment Help Basic Computer Science
Reference no: EM13829561

Problem:

A successful virus, spyware program, or exploit would be a disaster for any government agency that is providing critical services to the United States and its citizens; therefore, your team must specifically outline the steps involved in the information system (IS) risk assessment and develop an actual IS security risk assessment report for the client.

Provide a report to the client with the following information:

1. A title page

2. Content that includes the following:

  • Introduction to the contents of the report
  • Description of the types of real threats and vulnerabilities that the government agency is facing
  • Description of how the Certification & Accreditation team will determine risk and identify the specific level of risk for each vulnerability 
  • Description of how the organization will track critical deficiencies and the actions that must be taken to mitigate those vulnerabilities
  • Conclusion describing the approach taken with threats, vulnerabilities, tracking, and reporting to meet the Federal Information Security Management Act (FISMA) guidelines

The report should be a minimum of 3-5 pages in length

Additional Information:

This question is from Computer Science as well as it is about a scenario where you need to do risk assessment for virus or spyware attack and outline information security risk for your client.

Total Word Limit: 1151 Words

Reference no: EM13829561

Questions Cloud

What other decisions can capital budget techniques : In addition to project selection, what other decisions can capital budget techniques help managers with?
Review about influence of internet on our daily life : We live in a world where the internet plays a pinnacle role in our day to day lives. Discuss how the internet has caused an ethical debate on our information privacy.
Project scoring approach to capital budgeting decisions : A quasi-subjective project scoring approach to capital budgeting decisions:
Write a note on internal treatment of water : Discuss scales and sludges - Write a note on internal treatment of water
Problem regarding virus-spyware risk assessment : A successful virus, spyware program, or exploit would be a disaster for any government agency that is providing critical services to the United States and its citizens; therefore, your team must specifically outline the steps involved in the infor..
Business risk : Business risk
Investigate the options for the family : Identify a major city outside the state where you are currently living. Your task is to investigate the city for lodging options - investigate the options for the family.
Current structure of us social security program : Current Structure Of US Social Security Program
Estimating the corporate cost of capital : Estimating the corporate cost of capital is:

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Research methods to explain connectivity needs star clothing

Research the alternatives to address the connectivity needs for Star Clothing, and make a recommendation that includes the following.

  What should you do return computer to an operational state

Because you can't see the display, you can't work with the system. What should you do return the computer to an operational state?

  A digital forensic investigator for a healthcare organizatio

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance informati..

  List all the possible techniques that you might use

Elmwood College Situation: The school is considering a new system that will speed up the registration process. As a systems analyst, you are asked to develop a plan for fact-finding.

  Critical to the system forensics industry

Explain in your own words the importance of report writing and why you believe it is critical to the system forensics industry. Discuss the need for forensic reports when testifying as an expert witness.

  Write a program that computes the total amount of money

Write a program that computes the total amount of money in dollars and cents when the number of pennies (1 cent), nickels (5 cents), dimes (10 cents) and quarters (25 cents) are given. Sample execution of the program is given below.

  Evaluate an expression and display one value

What function would you use in Access to evaluate an expression and display one value when the expression is true, and another value when the expression is false?

  Write a class encapsulating a course

I must include a constructor, the accessors and mutators, and methods toString and equals. As part of this assignment, I have to write a client class to test all the methods

  Can a language have no reserved words

Can a language have no reserved words? That is, suppose every reserved word (such as if and for) were merely predefined identifier. Can such a language exist? Explain.

  Will action alter or destroy any historical and scientific

Will action alter or destroy any historical, scientific, or archaeological site? New engineering building project doesn't have any reported historical, scientific.

  Using sequential logic, counters and shift registers propose

using sequential logic, counters and shift registers propose a more complex system utilizing some of the more complex sub systems. example a motion acitavated light. Needs to be somthing other then a light example like motors or somthing

  Determining the speed of a computer

Explain the role of each of the following in determining the speed of a computer: RAM, Clock speed and Data on hard disk

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd