Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask English Expert

Assignment : Identifying Potential Risk, Response, and Recovery

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization.

She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Explain the concepts of information systems security as applied to an IT infrastructure.

Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

Use technology and information resources to research issues in information systems security.

Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

English, Academics

  • Category:- English
  • Reference No.:- M92256807

Have any Question?


Related Questions in English

Use the outline you created for the previous assignment

Use the outline you created for the previous assignment and: 1. Develop your topic into an essay of 1000 words. Keep in mind, that you are required to present and analyze the main topic by conducting a literature review ...

Reply to a classmate virginia regarding her post be sure to

Reply to a classmate Virginia regarding her post; be sure to offer a new quote or idea to keep the conversation flowing! Be sure to quote, cite, and reference from the text(s) using appropriate APA format. Your post must ...

Question commitment is very important in every work we do

Question: Commitment is very important in every work we do. If we commit to something that we will do, we must fulfill that commitment. Usually, we make commitment to the tasks to let others know that we will complete th ...

Question for each quote you must do three things 1 identify

Question: For each quote, you must do three things: 1. Identify work and author; 2. Discuss a theme of the work illustrated in the quote; 3. Relate the quote to the time period in which it was written. 1. "Alas! It was t ...

Read the two supporting documents focusing on airline

Read the two supporting documents focusing on airline globalization in 2018: Aviation Benefits: Contributing To Global Economic Prosperity/Uniting Aviation Aviation Benefits - 2017/ICAO (middle of page) Using the section ...

Case study gen y in the workforce by tamara j ericksonin

Case Study : Gen Y in the Workforce By Tamara J. Erickson In this fictional case study, a Generation X manager at a multimedia production and distribution company must decide how to work effectively with her recently hir ...

Guidelinesnbspthe critical analysis of an argument must be

Guidelines:  The critical analysis of an argument must be 6-7 typed, double-spaced pages based on  http://www.michaelmann.net/content/our-response-latest-climate-change-denying-wall-street-journal-op-ed   You should view ...

Reading practices are an intellectual endeavor this is not

Reading practices are an intellectual endeavor, this is not about reading in order to absorb information but rather, reading in order to analyze arguments, broaden our engagements with ideas, and generate a sense of ours ...

Assignment deep ecologythis is the most radical

Assignment : Deep Ecology This is the most "radical" environmental ethic. Remember, I would like you to try to determine where you stand with regard to the different environmental ethics. Also, when you do these assignme ...

Question prewriting and outlining for the narrative

Question: Prewriting and Outlining for the Narrative Essay This week, you will be preparing for next week's essay: the narrative. Take a moment and review the directions for the Week 3 narrative essay. Once you have a to ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As