Reference no: EM131592692
Let's do some risk analysis on a school's information assets. The school stores many types of about students and three of these are: identification information (name, address, SIN, telephone numbers etc.), IT information (username, password, email services, etc.), and financial information (tuition, student loans, banking information, etc.)
a. For EACH of the three types of information describe who would want to illegally access this type of information and why?
b. Consider what the impact would be for EACH of the three types of information mentioned above if the information was improperly accessed or damaged. Is the impact Catastrophic (expose school to serious lawsuits, loss of reputation, and/or information cannot be recreated), Serious (some exposure to lawsuits, loss of reputation and/or information is expensive to recreate), or No Big Deal (small chance of lawsuits, information can easily be recreated). Be sure to justify your choice for each type of information.
c. Now consider what the likelihood is that EACH type of information could be accessed or damaged: not likely, moderately likely, very likely. Justify why you think the information fits in that category.
d. Now let's look at how we can manage the risk. Basic techniques are: avoiding the risk, modifying the risk (impact and/or likelihood), transferring the risk to others, and accepting the risk. What techniques would you use for EACH of the types of information and how would you implement it?
Prepare the journal entry to record income taxes
: On January 1, 2014, equipment costing $600,000 is purchased. For financial reporting purposes, the company uses straight-line depreciation over a 5-year life.
|
Determine the amount of blue company inventory
: Blue Company follows the practice of pricing its inventory at the lower-of-cost-or-market, From the information above determine amount of Blue Company inventory
|
The response system methods of fema and dhs fusion centers
: Analyze the effectiveness of response system methods of FEMA and DHS Fusion Centers within the context of homeland security objectives and emergency response
|
Massively multiplayer online role-playing games
: In a virtual world (VW) of massively multiplayer online role-playing games (MMORPGs), collaboration and communication are provided through the Internet.
|
Risk analysis on a school information assets
: Let's do some risk analysis on a school's information assets. The school stores many types of about students and three of these are:
|
Determine the proper unit value for balance sheet
: Using the LCNRV rule, determine the proper unit value for balance sheet reporting purposes at December 31, 2017
|
Explain the communication issue from the scenario
: Explain the communication issue from the scenario. Concentrate on the facts of the situation and use either the inductive or deductive approach.
|
Draft the income tax expense section of the income statement
: Warranty expense accrued for financial reporting purposes amounts to $7,000. Warranty deductions per the tax return amount to $2,000.
|
Motherboard and cpu combination
: Select appropriate RAM for your chosen motherboard and CPU combination. Be sure that you meet or exceed the amount of memory.
|