Select real world organization or create a business scenario

Assignment Help Computer Engineering
Reference no: EM131919852

Cyber Risk Management ASSIGNMENT - Scenario Submission

TASK: Select a real world organization or create a business scenario.

This is a submission through the Assignments section of UAB Canvas. A scenario is defined by dictionary.com as:

i. an outline of the plot of a dramatic work, giving particulars as to the scenes, characters, situations, etc.

ii. the outline or the manuscript of a motion picture or television program, giving the action in the order in which it takes place, the description of scenes and characters, etc.

iii. an imagined or projected sequence of events, especially any of several detailed plans or possibilities

a. What Am I Submitting? So you are selecting or building a scenario that describes the scenes, characters or situations of a business organization in need of the application of risk management. The description should include scenes or situations that cover the four characteristics of risk management (confidentiality, integrity, availability, accountability) and the principles of risk management (defense in depth, least privilege, transitive risk, and separation of duties). You can expand on these characters, scenes and situations.

b. Why Am I Submitting this? The intent is to provide a scenario in rich enough detail so as to be able to apply the selected risk management framework and demonstrate what you have learned in the class. This should be a creative and fun assignment.

c. How Much Am I Submitting? The depth and breadth of the submission should be reflective of a graduate level team submission and commensurate with a submission worth 15% of your overall course grade. So what does that mean? It means it reflects the cumulative contribution of all team members. If you submitted an academic white paper in graduate school as an individual, it is typically 10-20 pages in length and probably worth a bit more than 15%. If you are a member of a 4-5 person team, would the submission be longer or shorter? The cumulative effect is you should generate a scenario that is rich enough to apply a risk management framework to and that is somewhere around 14-20 pages (single-spaced in normal font).

Reference no: EM131919852

Questions Cloud

Find new equity security to add to the portfolio : Your responsibility as a new analyst is to scour the universe of stocks and find a new equity security to add to the portfolio.
Examine the history of amsterdam city : Examine the history of Amsterdam city between the year 1001-1350 . Your research should identify a minimum of 3 major events or concepts that transpired.
Provide specific examples of products that lend themselves : Provide specific examples of products that lend themselves more to social networks than to search engine advertising.
How much are you willing to pay today for stock : How much are you willing to pay today for QE's stock if you require a 16.3% return?
Select real world organization or create a business scenario : CS 489/689 Cyber Risk Management ASSIGNMENT - Scenario Submission. Select a real world organization or create a business scenario
What do you expect the future price to be in five years : Assume that the appropriate discount rate is 7.375%. What do you expect the future price to be in five years?
How did frederick douglass become free : How did Frederick Douglass become free? What were the major events in this process? Explain how these events brought Douglass toward freedom.
How did the leader build the teams capacity to do its work : In what ways did the leader create the conditions that enabled the team to function?How did the leader build the team's capacity to do its work?
What is the average rate of return : What is the average rate of return you will earn if you bought the bond at this price and held the bond until maturity?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss circumstances when you would use one approximation

Consider a fully persistent DBN over n state variables X. Discuss the circumstances when you would use one approximation over the other.

  What are the possibilities for fulfilment

What are the possibilities for fulfilment? Please make sure you give examples of all of your teams proposals. Don't forget that these can be products (like hats, t-shirts, coffee mugs) as well as services (conferencing, computer time).

  Describe how your chosen organization uses technology

Describe how your chosen organization uses technology to improve its business goals or discuss your chosen article describing IT

  Design a nested menus interface for a check-in and checkout

Design a nested menus interface for a check-in and checkout hotel reservation system that can be used internationally. Use numbers to select a menu item.

  What is an advantage of polled interrupts

For a processor with 10 interrupting devices, which type of architecture, polled or vectored, provides the faster transfer of control to the interrupt service.

  List and sketch six of the common stock shapes

List and sketch six of the common stock shapes. What is the difference between roughing and finishing machining operations?

  Create a simple contact manager application

For this assignment you will create a simple contact manager application. This application will track personal information about the user's friends and acquaintances.

  Why this is basically a disaster recovery plan

How would you approach a backup and administration plan for the hypothetical situation described below. contain  any network administration systems that should be installed for remote access in the event of a network emergency. This is basically a..

  Write a report on how to used them

For several of the commands, you require to practice them on some files.

  What do you mean by 404 error what should you do if you

what is a 404 error? what should you do if you receive this error message?your answer should be at least 200 words and

  Case study asymmetric and symmetric encryption

Case Study Asymmetric and Symmetric Encryption

  Identify one web site that violates the use of colors

Identify one web site or application that violates the use of colors as described in Step 12 of the textbook. Take a screen shot of its screen and paste it in a Word document.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd