Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

Identifying Potential Risk, Response, and Recovery

*******DO NOT copy a source from the Internet and switched words to try to avoid plagiarism detection. DO NOT use answers already post on Coursehero. This assignment will be submitted through TurnItIn for plagiarism and a 0 grade is given for the entire assignment if any plagiarism. APA FORMAT CITE REFERENCES***

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

  1. For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.
  2. For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.
  3. Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.
  4. Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).
  5. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required page length. 

The specific course learning outcomes associated with this assignment are:

  • Explain the concepts of information systems security as applied to an IT infrastructure.
  • Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M92034425
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Business Management

In class today we spoke about leadership and ways a leader

In class today we spoke about leadership and ways a leader could utilize the below list of concepts could you help me understand as a leader how I could uitlize them and an example of what they are In the role of leaders ...

What does it mean to be engaged with your work employee

What does it mean to be engaged with your work, employee engagement or lack of engagement

Explain what strategies used by breadtalk and analyse and

Explain what strategies used by BreadTalk and analyse and evaluate its strategic performance (details).

How is vision used to confrontnbspresistance to change and

How is vision used to confront resistance to change, and move through it? How can a shared vision possibly facilitate collaboration or ultimately the successful implementation of a change initiative?

What are some of the reasons that email communications seem

What are some of the reasons that email communications seem to be so overwhelming and time consuming? What can be done to eliminate the "reply all" approach to business communications?

Sonya the manager of a restaurant has just hired three

Sonya, the manager of a restaurant, has just hired three servers. As part of their training program, she wants them to first learn by watching another, current server act out his job. Based on what you know about social ...

Need references for information for the following dealing

Need references for information for the following dealing with CSMS (Consolidated Sales and Marketing System Project) Produce a narrative which describes the added error-handling pathways that includes: an overview of th ...

Out of a random sample of 61 freshman at state university

Out of a random sample of 61 freshman at State University, 38 students have declared a major. Find a 96% confidence interval for the true population proportion of freshman at State University who have declared a major. C ...

List the three primary reasons that people become

List the three primary reasons that people become entrepreneurs and start their own firm.

Jo work as an admission coordinator for an assisted living

Jo work as an admission coordinator for an assisted living facility that just enacted its 5-year strategic plan. However, no one has communicated any of the components of the plan to any departments. Instead, management ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As