Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment: Application of Risk Management Techniques

Learning Objectives and Outcomes

- Identify different risk management techniques for the seven domains of a typical IT infrastructure and apply them under different situations.

Assignment Requirements

Introduction

As discussed in this lesson, after IT professionals identify threat/vulnerability pairs and estimate the likelihood of their occurrence, IT management must decide which risk management techniques are appropriate to manage these risks. IT managers then present this information to senior management. The role of the senior management is to allocate resources, specifically money and employees, to prepare for and respond to identified threats and vulnerabilities appropriately.

This assignment allows you to fulfill the role of an IT manager in a small business tasked with determining appropriate risk management techniques for identified threats and vulnerabilities and to make related recommendations to senior management.

Read the scenario given below and then complete the given assignment tasks that are given:

Scenario:

YieldMore is a small agricultural company that produces and sells fertilizer products. The company headquarters is in a small town in Indiana. Outside its headquarters, there are two large production facilities-one in Nebraska and one in Oklahoma. Furthermore, YieldMore employs salespersons in every state in the United States to serve its customers locally.

The company has three servers located at its headquarters-an Active Directory server, a Linux application server, and an Oracle database server. The application server hosts YieldMore's primary software application, which is a proprietary program managing inventory, sales, supply chain, and customer information. The database server manages all data stored locally with direct-attached storage.

All three sites use Ethernet-cabled local area networks (LANs) to connect the users' Windows 7 workstations via industry-standard managed switches.

The remote production facilities connect to headquarters via routers with T-1 LAN connections provided by an external Internet service provider (ISP), and share an Internet connection through a firewall at headquarters.

Individual salespersons throughout the country connect to YieldMore's network via virtual private network (VPN) software through their individual Internet connections, typically in a home office.

Tasks

Using the threat/vulnerability pairs, and considering the likelihood of occurrence for each identified by your group earlier in the lesson, assume the role of an IT manager assigned by YieldMore's senior management to conduct the following risk management tasks.

- Analyze and explain each of the threat/vulnerability pairs and their likelihood of occurrence.
- Determine which of the six risk management techniques is appropriate for each risk explained in Task 1.
- Justify your reasoning for each chosen management technique.
- Prepare a brief report or presentation of your findings for senior management to review.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92349909
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question?


Related Questions in Management Information System

Assignment1the following statement applies to snow flaked

Assignment 1. The following statement applies to snow flaked schemas: a. Large savings in storage space b. Normalized structures are more difficult to update and maintain c. Schema is less intuitive and end-users are put ...

Assignmentpart 1 research and detail an example of how you

Assignment Part 1: Research and detail an example of how you would for steganography to hide a message. Would you use a picture, video, audio message? Explore and select one method and detail in 1 page with figure, pictu ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Assignment 1 question 1 -should cultures within the united

Assignment 1 Question 1 -Should cultures within the United States be expected to set aside some traditions or beliefs and integrate under a united social contract? And Why? 300 word response with 2 to 3 references Assign ...

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Team leadershipmanagement stylepart 1 according to the

Team Leadership/Management Style Part 1: According to the Sarin and O'Connor (2009) article, certain style and goal structures of team leaders have a strong influence on internal team dynamics. Based on your research wit ...

Recent predictions for population growth in the 21st

Recent predictions for population growth in the 21st century are quite different from predictions made several decades ago. Find reports of older population model (say from 1960s, 1970s, or 1980s), and find reports of re ...

Summaryusing an organization of your choicedevelop a

Summary: Using an organization of your choice: Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company. Please note that this is a formal writing, all references (peer-reviewed) m ...

Project 6 policy review and recommendations

Project #6 Policy Review and Recommendations Presentation Instructions This is the final phase of the case study assignments. The primary purpose of this project is for you to demonstrate your understanding of the princi ...

Question why is a data language necessary for web

Question : Why is a data language necessary for web databases? What issues can arise with web database design? How secure are web databases from hackers? 275 words APA 2 sources

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As