Log In

Identifying Potential Risk Response And Recovery 3

In Assignment 1 (which I have attached), a videogame development company recently hired you as anInformation Security Engineer. After viewing a growing number of reportsdetailing malicious activity, the CIO requested that you draft a report in whichyou identify potential malicious attacks and threats specific to yourorganization. She asked you to include a brief explanation of each item and thepotential impact it could have on the organization.

After reviewing your report, the CIO requests that you develop a follow-upplan detailing a strategy for addressing all risks (i.e., risk mitigation, riskassignment, risk acceptance, or risk avoidance) identified in Assignment 1.Further, your plan should identify controls (i.e., administrative, preventative,detective, and corrective) that the company will use to mitigate each riskpreviously identified.

Write a four to five (4-5) page paper in which you:

  1. For each of the three (3) or more malicious attacks and / or threats thatyou identified in Assignment 1, choose a strategy for addressing the associatedrisk (i.e., risk mitigation, risk assignment, risk acceptance, or riskavoidance). Explain your rationale.
  2. For each of the three (3) or more malicious attacks and / or threatsidentified in Assignment 1, develop potential controls (i.e., administrative,preventative, detective, and corrective) that the company could use to mitigateeach associated risk.
  3. Explain in detail why you believe the risk management, controlidentification, and selection processes are so important, specifically in thisorganization.
  4. Draft a one (1) page Executive Summary that details your strategies andrecommendations to the CIO (Note: The Executive Summary is included in theassignment’s length requirements).
  5. Use at least three (3) quality resources in this assignment (no more than2-3 years old). Note: Wikipedia and similarWebsites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inchmargins on all sides; references must follow APA.
  • Include a cover page containing the title of the assignment, the student’sname, the professor’s name, the course title, and the date. The cover page andthe reference page are not included in the required page length.

Identifying_potential_malicious_attacks__threats_and_vulnerabilities_Riley.doc

× How can I help?