What adversary might exploit this risk Estimated likelihood of exploitation Impact if the risk is exploited 

Food and Agriculture week 2 discussion help
September 4, 2020
How do you manage human resources in a global technological environment?
September 4, 2020

What adversary might exploit this risk Estimated likelihood of exploitation Impact if the risk is exploited 

GuidelinesPapers must be 510 pages long (this would be roughly one page per area included in the report) with 10-point font. They must be double-spaced must include a cover page, table of contents, introduction, body of the report, summary or conclusion, and works cited.Even though this is not a scientific-type writing assignment, and is mostly creative in nature, references are still very important. At least six authoritative outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page, which is titled Works Cited. Appropriate citations are required.All DeVry University policies are in effect, including the plagiarism policy.Management Briefing (PowerPoint) is due at the end of Week 6 (resubmit to the Project Discussion topic in the Week 7 Discussion forum) of the course.Risk Assessment Report and Risk Management Matrix are due during Week 6 of this course.Any questions about the Course Project may be discussed in the weekly Q & A Discussion topic.The paper and PowerPoint are worth 190 total points and will be graded on quality of research topic, quality of paper information, use of citations, and grammar and sentence structure.Week 1Read the first week’s Course Project files in the CSPM Project Files and Hacker Project Files in Doc Sharing. To obtain the role information for either the CSMP or the hacker, go to the Doc Sharing dropdown menu. There you will see a box next to the Select View. Click on the arrow to view the choices. Then click on the GO button.The case study will explore an information system and the organization in which it operates, and the current state of the information system. You will choose a scenario from either the perspective of a Computer Security Program Manager (CSPM) or from a hacker’s perspective.Next, place your decision in a Word document and submit it to the Week 1 Course Project Planning Assignment Dropbox. If there are insufficient CSPM choices or hacker choices, the teacher may (randomly) ask a student to change the choice.Note: Once the choice is made, it is final. Sharing the CSPM and Hacker packets is not allowed.Each teacher will send an additional handout to each student and provide extra information pertinent to the case. Each member will be provided identical information as its other group members (either the CSPM or hacker group). The CSPM packet and the Hacker packet present different information. The idea is to get two views of the risk for comparison: one from the point of view of the CSPM, and one from the point of view of a hacker.Differing and contrasted perspectives offer a lens through which to view the problem of physical and operational security: from the lens of a responsible manager or from the lens of a hacker. The differing perspectives are useful in exploring the fundamental problems associated with securing an information system, and will have the student considering problems from both perspectives. In the industry, we even see the availability of hacker certification where technology professionals are trained to think like hackers in order to gain meaningful perspectives. As mentioned in the Week 1 Lecture, the advice to know the enemy and to think as the enemy is thousands of years old (Sun Tzu) but is as valid today as it was in 500 B.C.Week 6Management BriefingThe PowerPoint will be a briefing to senior management that could be used to present the findings of the risk assessment to management. The briefing will identify the system that was assessed, provide a brief description of the assessment process used, state the conclusions of the assessment, and recommend a course of action to management.At the end of Week 6, the senior management-level briefing will be posted to the Project Discussion topic in the Week 7 Discussion forum and discussed among class members during that week. Differences in approach and findings will be identified and the ramifications of those differences will be discussed. Discussion, however, is not limited to these two topics but is expected to be freewheeling (where anything is fair game, but please use discretion).Risk Assessment ReportThe risk assessment report will contain a simple risk management matrix that can be easily read and understood by senior management so that management can make an appropriate risk management decision.Risk Management Matrix The risk management matrix will be a matrix with at least the following columns.Risk description What adversary might exploit this risk Estimated likelihood of exploitation Impact if the risk is exploited  Recommended course of action At least three risks must be identified. Students are at liberty to add columns and rows to the risk management matrix if deemed necessary. Keep in mind this matrix is for senior management’s use.The following table is a sample to use. Brief Description of Risk Adversary (Who Might Exploit this Risk)Likelihood Impact Course of Action         Risk 1 Risk 2 Risk 3 Submit the Risk Assessment Report, Risk Management Matrix, and Management Briefing to the Week 6 Course Project Dropbox.Note: the Management Briefing receives two grades: one for its submission to the Project Discussion topic in the Week 7 Discussion forum and the other for its submission to its Week 6 Course Project Dropbox.See the Syllabus section Due Dates for Assignments & Exams for due date information.


 

PLACE THIS ORDER OR A SIMILAR ORDER WITH MY ONLINE PROFESSOR TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

The post What adversary might exploit this risk Estimated likelihood of exploitation Impact if the risk is exploited  appeared first on MY ONLINE PROFESSOR .

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.