Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

Risk Assessment Report

Your deliverable for this ITC596 task is an IT Risk Assessment report, written for the intended audience of management providing a risk assessment of a project. The project can be in any of the following areas:

  • Cybersecurity
  • Internet of Things
  • Cloud security
  • Mobile health devices
  • Bring Your Own Device
  • Smart vehicles
  • Or an area in your profession

Scenario options:

  1. You can work towards the scenario provided below; or
  2. You also have the opportunity to choose your own scenario-based risk assessment that could potentially be drawn from your own professional experience or context. The second option requires a discussion with and approval by your Subject Coordinator. The report structure requirements and criteria should be the same regardless of your scenario.

Provided Scenario

You have been hired as the IT Risk Assessment lead consultant for Gigantic Corporation (your specialisation is based on the area you have chosen above). Your role is to be the interface between business stakeholders and technologists, translating potential technical difficulties into risk language to facilitate effective decision-making by stakeholders. You have been engaged to assess a project that falls into your specialised area. Once you complete a full assessment, you are required to provide the IT assessment report to the management in the department or section that is running the project for Gigantic.

How to complete this task:

  1. You will write a report on the project IT risks based on the scenario.
  2. Your report must be a Microsoft Word document, 10 - 15 pages in length at 12 point font and single spacing. The report must address the following criteria:
    An Executive Summary at the beginning of the report which provides a clear statement of the technology project that is being assessed, and an overview of your recommendations to management as to the merits of the project based on your risk assessment (2 - 3 pages in length).

A risk assessment based on threats, vulnerabilities and consequences derived from an IT control framework and any existing industry risk recommendations for the project. Identify and discuss the key threat agents. What could be done to mitigate the risks and their impact on the system? (4 - 10 pages in length).

Provide a brief summary (literature review) of protection mechanisms you could employ for the information security. (2 - 4 pages in length).

3. The report is worth 15 marks of the overall marks available for assessment 3.

Engaging with scenario-based tasks provides you with the opportunity to simulate the real-world application of your learning in this subject.

Rationale

This assessment task will assess the following learning outcome/s:

  • be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.
  • be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.
  • be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Marking criteria and standards

back to top

Part 1 - Online Quiz

The quiz will involve multiple choice or true/false type questions. Marks will be given based on the correctness of the answers. Interact will be marking automatically and you will receive marks according to the following criteria:
HD - At least 85% answers were correct
DI - At least 75% answers were correct
CR - At least 65% answers were correct
PS - At least 50% answers were correct

Part 2 - Risk Assessment Report

Presentation

  • Assignments are required to be submitted in either Word format (.doc, or .docx). Each assignment must be submitted as a single document.
  • Assignments should be typed using Times New Roman/Arial, 12 point font. APA referencing style should be used. A reference list should be included with each assessment item.
  • All diagrams that are required should be inserted into the document in the appropriate position.

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M93108919
  • Price:- $45

Priced at Now at $45, Verified Solution

Have any Question?


Related Questions in Business Management

1 what is an entrepreneur and how is the entrepreneur

1. What is an entrepreneur? and How is the entrepreneur different from the inventor, promoter, and administrator? 3. What is intrapreneurship? and How can it be enabled in an organization?

Discuss the formal cultural elements that promote or

Discuss the formal cultural elements that promote or discourage moral actions within the organization?

Discuss the principle components of an effective and

Discuss the principle components of an effective and compelling vision. Then present the vision for your current/previous organization, detailing how you would improve upon that vision to ensure that it conforms to your ...

How does a database that is associated with a mobile device

How does a database that is associated with a mobile device and with mobile apps differ from a database that is stored and created using a more traditional application and server?

The text discusses four types of The text discusses four types of communications Top-Down

The text discusses four types of communications Top-Down Bottom-Up  Horizontal  Grape-Vine Select one communication type that you think is most effective, and one that you think is the least effective in organizations an ...

Why are we in the golden age of technology entrepreneurship

Why are we in the 'golden age' of technology entrepreneurship? What factors are helping entrepreneurs more rapidly achieve their vision, and with a lower cost?

What pressures do leaders face that challenge their ability

What pressures do leaders face that challenge their ability to work ethically?

A program takes two integers as input from the keyboard

A program takes two integers as input from the keyboard, representing the number of hits and the number of at-bats for a batter. Calculate the batter's hitting percentage. Check the hitting percentage to determine if it ...

How to obtain the value of command line arguments in a

How to obtain the value of command line arguments in a shell program?

What are some analysis and crime investigative methods that

What are some analysis and crime investigative methods that could be used in identifying gangs and/or gang activities?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As