Security policies and risk identification

Assignment Help Basic Computer Science
Reference no: EM132527233

Task : 1

Security Policies :

I'd like you to do a bit of discovery and evaluation. Find an Information Security Policy for an organization (try to find one that is no more than a page).

Post the policy, telling your classmates

What company is it for?

Who is the intended audience?

Are there any issues with the policy in terms of ease of understanding?

Does the policy have a well-defined scope?

What, if anything, would you change about the policy?

Other than citing where you got the policy, supporting references are not required for this discussion, (although they will help to make your response more supportable)

Task :2. 

Risk Identification:

Your company has decided to implement a human resource demographic portal. Under the system envisioned, employees would be able to change various personal information items themselves, such as name, address phone, marital status, etc. In addition, the employees would be able to change various payroll related items, such as 401k deduction percentages, the number of federal and state exemptions, as well as be able to view and print current and YTD pay information, including the current paycheck and check "stub". Under the current system, employees must go to the HR office to make any changes - there is no online access.

Your company already requires direct deposit for all employees, and under the new system, pay stubs would no longer be printed. Employees would be able to do this as needed through the portal.

There are many potential risks associated with this project.

Your task is to Identify as many risks as you can (4 is the minimum, but feel free to identify more risks if you so desire).

Determine the relative likelihood of each risk occurring (low, medium high)

Propose at least one strategy for addressing each risk

Describe the strategy in terms of the 4 risk responses (Avoidance, Transference, Mitigation, or Acceptance).

Remember that sometimes, risks are acceptable and can be taken, so long they are identified and a strategy to address the risk is presented.

For example, driving a car is a risky venture, but to address that risk we have driver's education (mitigation), manufacturing safety standards (mitigation), insurance (transference), and staying at home (avoidance). Driving an older, unsafe vehicle by an unlicensed and uninsured motorist could be considered Acceptance.

Reference no: EM132527233

Questions Cloud

Consider the effect on interest rates and investment : Consider the effect on interest rates and investment, also consider the worthiness of pursing increased GDP as a singular goal.
What amount should be reported as basic earnings per share : At the beginning of the current year, Kate Company had 500,000 ordinary shares outstanding. What amount should be reported as basic earnings per share
Dysprosium has unique magnetic properties : A rare earth element known as dysprosium has unique magnetic properties that make it a mandatory input in the manufacturing of wind turbines.
How does the auditors substantial doubt about a client : How does the auditor's substantial doubt about a client's ability to remain a going concern affect the format of the audit opinion
Security policies and risk identification : Find an Information Security Policy for an organization. Are there any issues with the policy in terms of ease of understanding?
Macroeconomic factors for childhood obesity : What are some macroeconomic factors for childhood obesity?
Determine the number of units adelphi sold during fy : CVP Income Statement,Use this information to determine the number of units Adelphi sold during FY 2018. (Round answer to nearest whole number)
What accounting recognition should be accorded : Wedyan Inc. is involved in litigation regarding a faulty product sold in a prior year. What accounting recognition should be accorded in this situation
What is the height of the cliff : A bottle dropped vertically downwards from the top of a cliff hits the sea 30s later. What is the height of the cliff?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Recover the message m given public keys

In other words, is it possible for the attacker to recover the message m given public keys and the ciphertext c=m^e mod N.

  Find the relative maxima-relative minima

Find the relative maxima, relative minima, and points of inflection, and sketch the graphs of the functions, in Problem.

  Detailing the evolution of chosen health policy

Create a 700- to 1,050-word timeline detailing the evolution of your chosen health policy. Include the following:

  Public key infrastructure is combination of software

Public Key Infrastructure (PKI) is a combination of software, hardware, and policies used to secure communications over an insecure medium.

  Create project budget and project schedule

In this assignment, you use Microsoft Project to create a Project Budget and a Project Schedule. You first develop your Project Schedule.

  Managers of the passive bond funds

What instruments are most often used by the managers of the passive bond funds?

  Defend to your management how utilizing porter five forces

Defend to your management how utilizing Porter's five forces to analyze any organization or industry would provide an understanding of competitive advantage.

  What proportion of the sample mean will fall

What proportion of the sample mean will fall at or above a mean of 102.56? Round the answers to no more than 2 decimal places

  Harnessing information management,data, and infrastructure

Harnessing Information Management, the Data, and Infrastructure.Ascertain the importance of information management for the company or industry that you have chosen.Analyze the fundamental impact of IT architecture or enterprise architecture on inform..

  Define a method hello

Define a method hello(name) which takes in a string representing a name and prints out "Hello, " followed by the name.

  Business intelligence systems

Differentiate the difference between data mining, text mining, and web mining?

  Does having large families make economic sense

Does having large families make economic sense in an environment of widespread poverty and financial insecurity?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd