Write the final risk management paper for carvend sales

Assignment Help Basic Computer Science
Reference no: EM132382789

After reviewing the slides for the final paper and / or listening to the lecture, compile your final paper.

Be sure to apply what you have learned to the scenario

Using APA format, write the final Risk Management Paper for CarVend Sales

Please pay attention to the SafeAssign score. If the items highlighted are not just the references, make sure you cite your sources!

The paper must contain

· Executive Summary

· Overview of the company

· Explanation of the IT network (refer to the diagram in PPT)

· Risk Assessment

· Identify assets and Activities to be protected

· Identity threats, vulnerabilities and exploits

· Risk Mitigation

· BIA

· BCP

· DRP and CIRT

· How your plan protects the company overall

OVERVIEW RELATED TO THIS PAPER

• Write paper in sections

• Understand the company

• Find similar situations

• Research and apply possible solutions

• Research and find other issues

Based on this information you have to do paper:

• You are an Information Technology (IT) intern

• CarVend Sales Inc.

• Specializes in online and vending machine sales of new and used cars

• Headquartered in Seattle, Washington

• Three other locations

• Portland Oregon

• Phoenix, Arizona

• Los Angeles, California

• Over 1000 employees

• $750 million USD annual revenue

• Each location is near a data center

• Managed by a third party vendor

• Production centers located at the data centers.

• CarVend Sales

• Handles customer purchases, trades and returns

• Online sales

• Small car lots

• CarVend Finance

• Web Portal to qualify customers for purchases

• Accepts various payment methods including debit, credit cards and loan financing

• CarVend Delivery

• Vendors who deliver cars to buyers homes

• Vendors that deliver to vending machines

• Four corporate data centers

• Over 1000 data severs

• 700 corporate laptops

• Mobile devices such as tablets in vendor delivery trucks

• Networked vending machines

• Current risk assessment was done quickly when the company was founded

• Your assignment is to create a new one

• Additional threats may be found during re-evaluation

• No budget has been set on the project.

• Loss of company data due to hardware being removed from production systems

• Loss of company information on lost or stolen company-owned or vendor assets, such as mobile devices and laptops

• Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

• Internet threats due to company products being accessible on the Internet

• Insider threats

• Changes in regulatory landscape that may impact operations.

Attachment:- Carvend sales inc Network.rar

Attachment:- Final paper.rar

Attachment:- Project Overview-Carvend sales.rar

Reference no: EM132382789

Questions Cloud

Demonstrate connection to your desired work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
Supply chain risk management : Find an article or paper addressing Supply Chain Risk Management and summarize it for your peers.
Credentials to strayer university maintained oracle server : Your instructor will provide you with login credentials to Strayer University maintained Oracle server. describe steps used to log into Strayer Oracle server.
Information governance and legal functions : Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas
Write the final risk management paper for carvend sales : write the final Risk Management Paper for CarVend Sales. Please pay attention to the SafeAssign score. Changes in regulatory landscape that may impact operation
Boiler plates provided for disaster recovery plan : Read the Boiler Plates provided for Disaster Recovery Plan and Computer Incident Response. What would you create as the DRP and CIRT for this scenario?
Develop disaster recovery plan for organization : Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance.
Classic cloud computing technology architectures : Classic cloud computing technology architectures are comprised of various mechanisms. These mechanisms or components enable cloud providers to meet simple
Security standards-policies and procedures manual : Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Web service versus direct access

What are the advantages and disadvantages of using a web service versus direct access?

  What is the resulting ciphertext

Consider WEP for 802.11. Suppose that the data is 10101010 and the keystream is 11110111. What is the resulting ciphertext?

  Calculate each student''s final average based on homework

Calculate each student's final average based on his or her homework score, quiz scores, and final exam. Homework counts for 20 percent of the student's final grade. The first two quizzes count for 10 percent each.

  Briefly explain who a hacker is

Briefly explain who a hacker is and what the activities of a hacker are?

  Password on a cisco router in your internetwork

What would you implement to facilitate password recovery of a lost enable password on a Cisco router in your internetwork?

  What is the price elasticity

Please explain how you got the answer to this question! You have the following demand for a pack of cigarettes: Q=200- 0.30P with the average quantity of 3 packs and average price of $3.00 per pack. What is the price elasticity?

  How is the regulation of security and trustworthiness

How is the regulation of security and trustworthiness on the Internet likely to develop? Will the private sector improve trust online? Will governments

  Eportfolios represent the prospective employee

Search online for three sample ePortfolios, and examine them in detail. Review the ePortfolios contents and think critically about how the ePortfolios represent the prospective employee. Reflect on the following questions and write your responses to ..

  What sampling design is his staff planning to use

Sketch a sampling model for the size difference in proportions of men and women with favorable impressions of this candidate that might appear in a poll like this.

  Huge amounts of resources on data over the years

Your organizations has invested huge amounts of resources on Data over the years. There are many databases, legacy systems, reporting applications, mix of in-house developed and off-the shelf software.

  Work-in-process inventory account

If the cost per equivalent unit for November was $4.60 for materials and $5.20 for labor and overhead, the balance in the work-in-process inventory account would be:

  Performing encryption at the disk-block level

What are the advantages of performing encryption at the disk-block level, below the file system? (Mark all that apply.)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd