Saturday, 30 July 2022

Week 6 Assignment - Mitigating Risks

 

Week 6 Assignment - Mitigating Risks

 

There are multiple ways to bring threats and vulnerabilities to light. Common practices and lessons learned can help us explore for known or common threats.

Instructions

Write a 3–4 page paper in which you:

  1. Explain the differences in threat, vulnerability, and exploit assessments for information systems and define at least two tools or methods to perform each type.
  2. Describe at least two tools or methods used to implement both physical and logical security controls (four in total), then identify the type of security personnel that would be used to implement each and discuss their roles and responsibilities.




https://hwacer.com/Tutorial/week-6-assignment-mitigating-risks/





  1. Describe three considerations when translating a risk assessment into a risk mitigation plan, then discuss the differences between a risk mitigation plan and a contingency plan. 
  2. Explain the two primary goals to achieve when implementing a risk mitigation plan and discuss the methods of mitigation for common information system risks.
  3. Use at least two quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library is a good location for resources.

Wednesday, 27 July 2022

Week 4 Assignment - Risk Methodologies and Analysis

 

Week 4 Assignment - Risk Methodologies and Analysis

 

Assignment - Risk Methodologies and Analysis

Overview

In order to successfully manage risk, one must understand risk itself and the assets at risk. The way one goes about managing risk will depend on what needs to be protected, and from what to protect it.

Instructions

Write a 3–4 page paper in which you:



https://hwacer.com/Tutorial/week-4-assignment-risk-methodologies-and-analysis/




  1. Discuss at least three rationales for performing an information systems security risk assessment.
  2. Explain the differences in quantitative, qualitative, and hybrid information systems risk assessment and illustrate the conditions under which each type is most applicable.
  3. Describe the type of information that is collected to perform an effective information systems security risk assessment. Include at least three different types. Fully describe each and justify why you made your selections.
  4. Describe at least five common tasks that should be performed in an information systems security risk assessment.

Assignment - Risk Methodologies and Analysis

Overview

In order to successfully manage risk, one must understand risk itself and the assets at risk. The way one goes about managing risk will depend on what needs to be protected, and from what to protect it.

Instructions

Write a 3–4 page paper in which you:

  1. Discuss at least three rationales for performing an information systems security risk assessment.
  2. Explain the differences in quantitative, qualitative, and hybrid information systems risk assessment and illustrate the conditions under which each type is most applicable.
  3. Describe the type of information that is collected to perform an effective information systems security risk assessment. Include at least three different types. Fully describe each and justify why you made your selections.
  4. Describe at least five common tasks that should be performed in an information systems security risk assessment.

 

CIS 527 Week 4 Discussion

CIS 527 Week 4 Discussion

 

During the Coronavirus pandemic of 2020, several questions arose about the appropriate time to restart the U.S. economy and the related risks surrounding this decision. When forming a risk assessment, it is important to distinguish between risk and uncertainty.




https://hwacer.com/Tutorial/cis-527-week-4-discussion-2/





Listen to or read the NPR story, When Should We Restart the Economy?

Then research and discuss two new topics: one is a topic that meets the category of uncertainty and another meets the category of risk for (1) the overall United States population and (2) your own personal example. Describe each of your topics, then fully explain and justify why you feel they meet the category that you indicate. Provide any links and references as necessary.
 

Sunday, 10 July 2022

Week 2 Assignment - Risk Management

 

  1. Week 2 Assignment - Risk Management

    Overview

    It is an accepted truth that without risk there can be no gain. Every individual and organization must take some risks to succeed. Risk management is not about avoiding risks, but about taking risks in a controlled environment. To do this, one must understand the risks, the triggers, and the consequences.

    Instructions

    Write a 3–4 page paper in which you:

    1. Define risk management and information security clearly. Discuss how information security differs from information risk management.

    1. Explain security policies and how they factor into risk management.
    2. Describe at least two responsibilities for both IT and non-IT leaders in information risk management.
    3. Describe how a risk management plan can be tailored to produce information and system-specific plans.

    1. Use at least two quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library is a good source for resources.

    Your assignment must follow these formatting requirements:

    • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

    The specific course learning outcome associated with this assignment is:

    • Assess how risk is addressed through system security policies, system-specific plans, and contingency plans.



https://hwacer.com/Tutorial/cis-527-risk-management/





CIS 527 Week 2 Discussion Question

 

CIS 527 Week 2 Discussion Question

Riding a bike can be a risky business, particularly if you're using a cell phone while doing so. Read the article on the Netherland's legislative proposal to ban the use of cell phones on bicycles, Netherlands Proposes Legislation to Ban Use of Phones on Bicycles. Then, respond to the following:


https://hwacer.com/Tutorial/cis-527-week-2-discussion-question/



  • First, give your perspective on whether you think this is a needed and good proposal or not, and why.
  • Second, add how you would enforce compliance for this type of proposal.
  • Finally, address whether you think this type of proposal should be put into place in any U.S. cities, and if so, where and why, and if not, why not?

Friday, 8 July 2022

CIS 527 Week 1 Discussion Question

Elon Musk, CEO of Tesla, SpaceX, and Neuralink, has been in the news a lot lately. Companies that are closely associated with their founder are often influenced by their founder’s actions. Speculation is that some of Musk’s recent behavior has raised the level of risk for Tesla. Read the article, “The Biggest Risk That Will Determine Tesla’s Fate: Elon Musk Himself.” Then, respond to the following: First, comment on your perspective of Elon Musk’s behavior and if you feel that it is positively or negatively influencing Tesla. Second, add any additional steps that you think Tesla could take to minimize the effect of their founder, Elon Musk. Finally, add your own example of a growing company that may fall into the same category as Tesla with a well-known founder and any specific steps that they could take to minimize this type of risk. 


https://hwacer.com/Tutorial/cis-527-week-1-discussion-question/

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...