Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

The Cornersea Shire Council's IT manager, Lex Georghiu has accepted your report on the initial risk assessment. It was tabled to the leadership team, and after much deliberation a reasonable budget was approved to improve the council's security posture.

You have been assigned to the Shire of Cornersea to carry out an extensive risk assessment on the council's information management practices and on its information assets

Your task is to produce a 2500 word business report addressing the above requirements.


Project: Risk Management Plan (Group)

For this part of the assigned project, your team must first create the risk management plan.

To do so, you must:

1. Develop and provide an introduction to the plan by explaining its purpose and importance. Hint: Clearly and concisely assesses Cornersea's strategic context and proposes an appropriate risk appetite and risk tolerance for the company

2. Create an outline for the completed risk management plan.

3. Define the scope and boundaries of the plan.

4. Develop a proposed schedule for the risk management planning process.

Project: Risk Assessment Plan (Individual)

After creating this risk management plan, the second part of the assigned project requires you (individual) to create the risk assessment (RA) plan. To do so, you must:

5. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessment.
6. Develop a proposed schedule for the RA process.

7. Carefully audit the case, undertake an inventory and identify information assets that includes both, Corneasea's most significant business information, and the information systems that must be accounted for in any approach to risk management.

8. Identify and provide an analysis of the threats and vulnerabilities that pose the greatest risks to Cornersea's most important information assets (information and systems).

9. Present a likelihood and impact analyses for the most significant risks you have identified.

10. Prioritize the most significant risks for Cornersea and provides details in a risk assessment table.

Following the completion of the risk assessment report, CORNERSEA will evaluate the next steps for your consultancy.

The risk assessment needs to be conducted in accordance with best practice and should apply (one, or a hybrid combination of) the leading standards, guidelines or frameworks pertaining to IS risk and security management. Your report must articulate clearly which standards/guidelines it has followed and how they have been used.

The following should be included with your risk assessment report

A completed assignment cover sheet (available from Blackboard prior to submission),

Relevant appendices for the report (should be used as you deem appropriate), A report reference list that applies the Harvard style guide (in text citation is an expectation for this report),

A record of tasks allocated to group members for the assignment and a brief record (minutes) of the meetings held by the group.

Please note: The assessment criteria for this report focuses on your analysis and explanation of the risk assessment you undertake. While all appendices, tables and diagrams used in the report will contribute to your assessment, they do not be count towards the word limit for the assignment.

However, all diagrams and tables in the report and any appendix added to the report must be relevant, significant and well supported (through written description) in order to count favorably towards your assessment.

Appendices, diagrams or tables that have been used simply to extend the allowable length of the assignment will not be assessed.

Attachment:- Case Study.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92766126

Have any Question?


Related Questions in Management Information System

Topics in information technology ethics assignment

Topics in Information Technology Ethics Assignment - Learning outcomes - On successful completion of this subject, you should: be able to identify ethical issues related to ICT; be able to assess the implications of ethi ...

Exercise 73 filling the human gapyou work for a medium

Exercise 7.3: Filling the Human Gap You work for a medium seized manufacturing company that has a well developed DR plan. The plan is well tested and the testing has revealed a serious personnel gap During a recovery, ke ...

Since osi model is a virtual model based on your reading

Since OSI model is a virtual model; based on your reading this week, why do you think the data communication industry would use the layered OSI reference model? What does modeling mean to you? How would you model somethi ...

Using jython 50 or higherdevelop three new methods for the

Using Jython 5.0 or higher Develop three new methods for the Turtle class as follows: Add a method to the Turtle class to draw a rectangle given a certain width and height Add a method to the Turtle class to draw a simpl ...

Transformation at bank of america an enterprise systems

Transformation at Bank of America: An Enterprise Systems Analysis: MIT SDM Systems Thinking Webinar Serieswallance By Daniel Wallance, SDM ’11 Please watch the webinar and write a two pages report to include the backgrou ...

Many organizations have now adopted or begun to offer cloud

Many organizations have now adopted or begun to offer cloud computing. This type of computing has advantages and disadvantages that may vary from organization to organization. Select two (2) organizations in which you ar ...

Project deliverable business requirements this assignment

Project Deliverable : Business Requirements This assignment consists of two (2) sections: a business requirements document and a project plan. You must submit both sections as separate files for the completion of this as ...

You are the project manager for an upgrade of computers in

You are the project manager for an upgrade of computers in your company. You need to upgrade 30 systems, including 10 desktops (for office personnel) and 20 laptops (for remote workers). Each system must access the compa ...

Question suppose that you buy a 64-bit pc with 4gb of ram

Question Suppose that you buy a 64-bit pc with 4gb of ram. What is the 16-hex-digit of the last byte of installed memory? Please help me understand this. Show work.

Write 500 word response to the case belowcase study

Write 500 word response to the case below. Case study Statement and Tasks Refer to the textbook chapters 4, 5, 6, the attached handout "Network Attacker Document", and your findings from searching the internet about netw ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As