Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.

Write a four to five (4-5) page paper in which you:

For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.

Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment's length requirements).

Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Explain the concepts of information systems security as applied to an IT infrastructure.

Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

Explain the means attackers use to compromise systems and networks, and defenses used by organizations.

Use technology and information resources to research issues in information systems security.

Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.

Attachment:- malware_done.rar

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M92218506
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Homework Help/Study Tips

Discussion 250-300 wordsthis week you will review different

DISCUSSION 250-300 WORDS This week you will review different types of bias, present an example of a study, and discuss whether bias was a factor in the study outcome. You will also discuss how the study design could have ...

Assignment 12 conflicting viewpoints essay - part

Assignment 1.2: Conflicting Viewpoints Essay - Part II Synthesizing and Writing When looking for information about a particular issue, how often do you try to resist biases toward your own point of view? This assignment ...

Question theoriesnow that you have read and reviewed

Question: THEORIES Now that you have read and reviewed theories of development, take your learning a step further by testing your critical thinking skills on this scientific reasoning exercise. Five (5) major theories of ...

Introduction this assignment will assist in your gaining a

Introduction: This assignment will assist in your gaining a better understanding of the culture influence in society This assignment fulfills/supports Module Outcome: You will be able to identify some ways that the diffe ...

Question the textbook and the readings for this first topic

Question: The textbook and the readings for this first topic begin to describe some of the key elements for a successful therapeutic relationship. Write a 1,200-1,500-word essay that describes the characteristics and rol ...

Question dazzle jewelry company is a new startup

Question: Dazzle jewelry company is a new startup merchandising company with the goal of offering fine jewelry at reasonable prices. This goal has been made possible by securing manufactures that have agreed to offer who ...

Question 1 with the explosion of users on social media

Question: 1. With the explosion of users on social media sites, businesses need to establish their presence on social media sites. Just search for "Vans" or "Starbucks" on Facebook for examples of company sites. To manag ...

Discussion questions submit your response to the question

Discussion Questions: Submit your response to the question to the appropriate Discussion Area by the due date assigned. Through the end of the module, comment on the responses of others. You will be attempting two discus ...

Case study 1 walmart manages ethics and compliance

Case Study 1: Walmart Manages Ethics and Compliance Challenges Read "Case Study 3: Walmart Manages Ethics and Compliance Challenges," located on page 407 of the textbook. Then, read the article titled, "The Good, the Bad ...

Assignmentdefine probable cause and compare that standard

Assignment Define "Probable Cause" and compare that standard of probable cause against the following statements of degree of certainty: absolutely positive; pretty sure; good possibility; beyond a reasonable doubt; reaso ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As