Risk analysis on a school information assets

Assignment Help Basic Computer Science
Reference no: EM131594370

Let's do some risk analysis on a school's information assets. The school stores many types of about students and three of these are: identification information (name, address, SIN, telephone numbers etc.), IT information (username, password, email services, etc.), and financial information (tuition, student loans, banking information, etc.)

a. For EACH of the three types of information describe who would want to illegally access this type of information and why?

b. Consider what the impact would be for EACH of the three types of information mentioned above if the information was improperly accessed or damaged. Is the impact Catastrophic (expose school to serious lawsuits, loss of reputation, and/or information cannot be recreated), Serious (some exposure to lawsuits, loss of reputation and/or information is expensive to recreate), or No Big Deal (small chance of lawsuits, information can easily be recreated). Be sure to justify your choice for each type of information.

c. Now consider what the likelihood is that EACH type of information could be accessed or damaged: not likely, moderately likely, very likely. Justify why you think the information fits in that category.

d. Now let's look at how we can manage the risk. Basic techniques are: avoiding the risk, modifying the risk (impact and/or likelihood), transferring the risk to others, and accepting the risk. What techniques would you use for EACH of the types of information and how would you implement it?

Reference no: EM131594370

Questions Cloud

Discuss how the concept of workstation domains figure : Briefly discuss how the concept of workstation domains figure into your organizations security policies, please cite and list your references.
Determine the transfer function for each system : The pole-zero plots of four causal LTIC systems are shown in Fig. Determine if the LTIC systems are stable. Also determine the transfer function H(s).
Provide examples for the stakeholders to provide context : Provide options and examples for the stakeholders to provide context. Research the types of information these stakeholders might be interested in.
Determine the pole-zero plots of the inverse systems : The inverse of an LTIC system is defined as the system that when cascaded with the original system results in an overall transfer function of unity.
Risk analysis on a school information assets : Let's do some risk analysis on a school's information assets. The school stores many types of about students and three of these are:
Analyze business strategy to identify hr requirements : Analyze international business strategy to identify human resource requirements and formulate supporting HRM plans that can improve productivity.
Examine the laplace transfer function : An LTIC system has an impulse response h(t) with the Laplace transfer function H(s), which satisfies the following properties.
Discuss how important is the role of leadership : With a tremendous amount of focus and attention being paid to those in the law enforcement profession right now, how important is the role of leadership
Discuss the different approaches to public speaking : Discuss the different approaches to public speaking. What is your style, persuasive or informative? Which is more effective and when?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is a negative feedback loop

When a task is not being completed according to the plan, what two circumstances are likely to be involved?

  How far is dead center field from first base

In Wrigley Field in Chicago, dead center field is 400 feet from home plate. How far is dead center field from first base?

  Any difference in memory allocation of these two

Any difference in memory allocation of these two?

  Create ascii and binary stl files from the solid model

Create ASCII and binary STL files from the solid model stored in the composite.dwg file, which you created in Chapter 44. Compare the sizes of the two files and then view the contents of the ASCII STL file.

  Topnotch should record the leases

sales-type leaseAs the accountant for TopNotch, explain how TopNotch should record the leases. Be sure to support your rationale.

  Maintaining a website is crucial in any business.

I thought this author made a good argument for why a maintenance plan is important - do you agree with his argument? Did anything in the article surprise you?

  What is the difference between the client and the server

What is the difference between the client and the server? What is the difference between server-side and client-side scritping? Why are they separate?

  Electronic media and e-mail

Conduct research using the CSU Online Library to find at least two articles on a company that heavily uses electronic media and e-mail. You may need to visit the company's website policy page or other sources, in addition to the library article, i..

  Research paper proposal

As you are exploring different ideas for your paper, note the research paper will require you to submit 8-10 double-spaced, typed pages regarding a topic identified in the textbook or another topic relative to this course.

  Compute the side-length of a square plate capacitor

if the smallest observable voltage is 0.1 V, compute the side-length of a square plate capacitor that can detect one electron, assuming the dielectric is air with relative permittivity of 1 and the distance between plates is 10 nm (10 × 10-9 m).

  Which of the following is wrong

Which of the following is wrong? A. LDX #$5000 B. LDX #2550 C. LDX #$10000 D. LDX #$00 Explain Why!

  What is cyber crime and cyberbullying

What is Cyber Crime and Cyberbullying and how can they be prevented.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd