Provide recommendations for mitigating risk

Assignment Help Management Information Sys
Reference no: EM132869680 , Length: word count:2350

MIS607 Cybersecurity - Laureate International Universities

Assessment - Mitigation Plan for Threat Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Context

Cybersecurity help organizations to mitigate threats/risks, reduce financial loss and safety violations, decrease unethical behaviour, improve customer satisfaction, and increase efficiency, as well as to maintain these improved results. Threats can be resolved by Risk Acceptance (doing nothing), Risk Transference (pass risk to an externality), Risk Avoidance (removing the feature/component that causes the risk) and Risk Mitigation (decrease the risk). This assessment gives you an opportunity to demonstrate your understanding of cybersecurity and your capability to explain Risk Mitigation strategies for such threats. Mitigations should be chosen according to the appropriate technology and resolution should be decided according to the risk level and cost of mitigation.

Task Instructions

1. Read the Assessment 2 Case Scenario again to understand the concepts discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the mitigation plan for threat report.

3. The mitigation plan for threat report should address the following:
• Setting priorities for risks/threats

• Analyse the case in terms of identified risk categories and scenarios
• Apply standard mitigations
• Discuss specific resolutions for improvement, and justify their significance
• Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk levels (Choose techniques to mitigate the threats)
• Make recommendations to the CEO on how to conduct risk management, key issues involving your process improvement model, including a road map, the identification of appropriate technologies for the identified techniques, communicating the strategy, and a suggested timeline.

4. The report should consist of the following structure:
A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in mitigation plan report. You will need to inform the reader of:
a) Your area of research and its context (how to mitigate or manage threats)
b) The key concepts you will be addressing
c) What the reader can expect to find in the body of the report

The body of the report will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the report. Set priorities for identified threats from assessment 2, analyse the case in terms of identified risk categories and discuss specific resolutions and recommendations for improvements in the body of the report.

The conclusion (will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA referencing style.

Attachment:- Cybersecurity.rar

Reference no: EM132869680

Questions Cloud

Stages of an outbreak in a fully susceptible population : Herd Immunity: Let Ro denote the reproduction number (i.e., the average number of new infections caused by a person, infected with a virus, in the early stages
What is shareholder theory and stakeholder theory : 1. What is shareholder theory and stakeholder theory and how they can come into conflict with one other?
Examine the potential for near future information system : Critically examine the potential for near future information system-related transformations within your own organization.
Determine the total overhead applied to Job : Using the departmental overhead application rates, determine the total overhead applied to Job #231 in the Tooling and Fabricating Departments
Provide recommendations for mitigating risk : Mitigation Plan for Threat Report - Analyse issues associated with organisational data networks and security to recommend practical solutions towards
Enron-the biggest fraud in history : Read the story from internet: Enron - The Biggest Fraud in History try to answer the questions based on the ethical theory:
General environment impact the firm operation : Explain how the force in the general environment impact the firm operation. In regards to the Keurig Coffee Case
How will you maintain consistency : How will you maintain consistency? Describe the quality control procedures you'll use.
Analyze areas of an organization strategic goals : What does it mean to analyze areas of an organization's strategic goals supported by analytics?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop a crud matrix

Develop a CRUD matrix that outlines the relationships among the pieces of information and user privileges

  Supply chain management-hi i need help with this question i

supply chain management-hi i need help with this question i need about a page to asnwer this thanks a company has two

  Explain the different types of knowledge

Discuss how you have used collaborative computing over the web (e.g. MS Lync, GoTo Meeting, git, etc.).

  What worked and did not work to keep you productive

What motivational theories explain why your employer's efforts worked or didn't work to keep their employees productive, satisfied, or motivated?

  Metrics for measuring the success of it systems

Measure success of IT systems: Infrastructure-centric, Web-centric, call center metrics

  Attackers are becoming more ingenious

Attackers are becoming more ingenious in their attack methods every day. A part of this evolving methodology is the physical aspect of security. Please respond to all of the following prompts:Q - Why are anti-social engineering and dumpster diving sa..

  Identify emerging it trends through scholarly or trade

Identify emerging IT trends through scholarly and/or trade literature. Understand the impact of innovative IT solutions on business.

  What segments of the healthcare population would you choose

Imagine you have just inherited $1 million and you want to establish a healthcare enterprise. What segments of the healthcare population would you choose to focus on? Provide three ways you would market your services to the population segment(s) y..

  What constraints did you experience and how did you handle

Describe an IT or similar business project you have done or are currently doing.What is that project?

  Discussion of the exsisting system

Discussion of the exsisting system and brief discussion of the current standard used to manage forms - manage the transistion to a scanned form.

  Identify the major components of contingency planning

Explain why risk, risk analysis, and prioritization of a company's risks are some of the best methods to reduce threats in vulnerability management.

  Describes the sourcing trends that are important for it

Report on outsourcing and insourcing by Deloitte Consulting describes the sourcing trends that are important for IT.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd