Security policies and risk identification

Assignment Help Basic Computer Science
Reference no: EM132527233

Task : 1

Security Policies :

I'd like you to do a bit of discovery and evaluation. Find an Information Security Policy for an organization (try to find one that is no more than a page).

Post the policy, telling your classmates

What company is it for?

Who is the intended audience?

Are there any issues with the policy in terms of ease of understanding?

Does the policy have a well-defined scope?

What, if anything, would you change about the policy?

Other than citing where you got the policy, supporting references are not required for this discussion, (although they will help to make your response more supportable)

Task :2. 

Risk Identification:

Your company has decided to implement a human resource demographic portal. Under the system envisioned, employees would be able to change various personal information items themselves, such as name, address phone, marital status, etc. In addition, the employees would be able to change various payroll related items, such as 401k deduction percentages, the number of federal and state exemptions, as well as be able to view and print current and YTD pay information, including the current paycheck and check "stub". Under the current system, employees must go to the HR office to make any changes - there is no online access.

Your company already requires direct deposit for all employees, and under the new system, pay stubs would no longer be printed. Employees would be able to do this as needed through the portal.

There are many potential risks associated with this project.

Your task is to Identify as many risks as you can (4 is the minimum, but feel free to identify more risks if you so desire).

Determine the relative likelihood of each risk occurring (low, medium high)

Propose at least one strategy for addressing each risk

Describe the strategy in terms of the 4 risk responses (Avoidance, Transference, Mitigation, or Acceptance).

Remember that sometimes, risks are acceptable and can be taken, so long they are identified and a strategy to address the risk is presented.

For example, driving a car is a risky venture, but to address that risk we have driver's education (mitigation), manufacturing safety standards (mitigation), insurance (transference), and staying at home (avoidance). Driving an older, unsafe vehicle by an unlicensed and uninsured motorist could be considered Acceptance.

Reference no: EM132527233

Questions Cloud

Consider the effect on interest rates and investment : Consider the effect on interest rates and investment, also consider the worthiness of pursing increased GDP as a singular goal.
What amount should be reported as basic earnings per share : At the beginning of the current year, Kate Company had 500,000 ordinary shares outstanding. What amount should be reported as basic earnings per share
Dysprosium has unique magnetic properties : A rare earth element known as dysprosium has unique magnetic properties that make it a mandatory input in the manufacturing of wind turbines.
How does the auditors substantial doubt about a client : How does the auditor's substantial doubt about a client's ability to remain a going concern affect the format of the audit opinion
Security policies and risk identification : Find an Information Security Policy for an organization. Are there any issues with the policy in terms of ease of understanding?
Macroeconomic factors for childhood obesity : What are some macroeconomic factors for childhood obesity?
Determine the number of units adelphi sold during fy : CVP Income Statement,Use this information to determine the number of units Adelphi sold during FY 2018. (Round answer to nearest whole number)
What accounting recognition should be accorded : Wedyan Inc. is involved in litigation regarding a faulty product sold in a prior year. What accounting recognition should be accorded in this situation
What is the height of the cliff : A bottle dropped vertically downwards from the top of a cliff hits the sea 30s later. What is the height of the cliff?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd