RisK Mgt Project part – 2-3 Page

  

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

  

Project Part

Deliverable

 

Project   Part 1

Task   1: Risk Management Plan

 

Task   2: Risk Assessment Plan

 

Task   3: Risk Mitigation Plan 

 

Project   Part 2

Task   1: Business Impact Analysis (BIA) Plan

 

Task   2: Business Continuity Plan (BCP)

 

Task   3: Disaster Recovery Plan (DRP)

 

Task   4: Computer Incident Response Team (CIRT) Plan

 

Final   Project

Risk   Management Plan Final Submission

Submission Requirements

All project submissions should follow this format:

  • Format:      Microsoft Word or compatible
  • Font:      Arial, 10-point, double-space
  • Citation      Style: Your school’s preferred style guide
  • Minimum 2      pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

  

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and      provide an introduction to the plan by explaining its purpose and      importance. 
  2. Create an outline      for the completed risk management plan. 
  3. Define the scope      and boundaries of the plan. 
  4. Research and      summarize compliance laws and regulations that pertain to the      organization. 
  5. Identify the key      roles and responsibilities of individuals and departments within the      organization as they pertain to risk management. 
  6. Develop a proposed      schedule for the risk management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

Evaluation Criteria and Rubrics

  • Did the student      demonstrate an understanding of the competencies covered in the course      thus far?
  • Did the student      include all important components of a risk management plan in the outline?
  • Did the student      demonstrate good research, reasoning, and decision-making skills in identifying      key components and compliance laws and regulations?

Did the student create a professional, well-developed draft with proper grammar, spelling, and punctuation? 

Ethical Hacking

1.) Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures), which characteristics do you believe to be the most important in this role? Please explain your choice. 

2.) Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.

Discussion

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two references (academic or professional literature) in APA v7 format.

Digital Forensics

Chief Executive Officer & Disgruntled Employee

Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO’s) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages. 

In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action. 

 Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages.

Thank goodness, information gathered from a router early in the investigation showed that the CEO’s IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization. 

The discovered MAC address used to locate the antisocial computer workstation belongs to a one of the disgruntled active employees who is a member of software development department within the organization.

Persistent investigation reveals that the disgruntled employee’s computer workstation is involved in this unlawful and criminal operation. 

Question-1

Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer & Disgruntled Employee operation?

Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of information technology security (ITS) team.

Question-2                

Do you agree that the digital forensic investigator must seek assistance from the organization ITS team to fully exonerate the CEO?

Question-3

Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene?

If Yes, provide a comprehensive narrative to support your assertion.

review the corresponding data set and use it to answer questions and complete an exploratory data analysis. You will use R and Excel to complete the assignment.

The second data set includes data about the customers of a telecom company, the services they subscribed to, and whether they left the company’s services. Multiple aspects of the customer’s behaviors could be analyzed using this dataset.

The data and the variable descriptions can be found at:

https://www.kaggle.com/blastchar/telco-customer-churn

Requirements:

Part I: Contextualization

In the Introductory section for Part 1 of your 4-5-page report, provide a contextualization of the dataset by doing the following:

Download the selected data set and review its description. Specify the selected dataset.

Summarize the story behind the data. Provide in-text and reference list citations of any outside sources that you consulted to contextualize the data collection efforts.

Explore the dataset. Explain the attributes of the entities.

Describe the data captured in the data set.

Summarize three observations from a cursory visual inspection of the data.

Part II: Research Questions

When data is collected, or even before collection starts, we have the purpose of the analysis in mind and plan accordingly. For an analysis to provide us with meaningful insight, we must plan it well and have a clear research question or questions in mind. The term “research” can sound scary, but it refers to a path to satisfying curiosity or resolving a problem. For Part II, which should be 2-3 pages, provide an analysis based on the background of the data sets:

Write three questions that this dataset can help answer.

Explain the importance of these questions in a business or other relevant context.

Identify the variables from the data set that are relevant to the questions.

Write a sample statement of outcome that your analysis may reveal.

Underline the words in these statements that refer to the variables identified in task prompt H.

Part III. Data Preparation and Distribution Analysis. Using an R script, please perform the following:

Identify the columns that hold the values of the variables you previously identified in the analysis of the research questions. Write R script to generate a subset of the given data. If the variable is categorical and the values are not numerical, transform the values into numerical values. For example, if the values of a column are ‘Y’ and ‘N’, use SQL to convert them to “0” and “1” respectively when generating the subset. That includes only the values for the selected variables and translate categorical values into numeric codes.

Write an R script for a query that provides insights into your research question.

Part IV. Reporting

Write a 250-word executive summary for members of the general public outlining the findings from your analysis.

Your well-written report should be 10-12 pages in length, not including the title or reference pages. Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings.

You will upload a zipped file that includes your 10-12-page report and all supporting files, including Word, R code and Excel files, and screenshots that support the presentation of the findings in the report.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

Draw a diagram

  

  1. This      is problem 5.13 from your text book. You can use any Free UML tool      (see the list on the Moodle or Visio software tool) You need to draw a UML      diagram for a system.

Consider a hospital’s patient monitoring system. Each patient is connected to machines monitoring blood pressure, heart rate, and EKG. These machines issue a Boolean signal indicating a FAIL or WORKING condition. The results of each of these machined are ‘ORed’ together to form a signal called ALARM. The ALARM signals for each of the rooms (one patient per room) are then ‘ORed’ together and sent to the nurse’s station. If any machine on any patient indicates a failure, the emergency alarm is sounded and the nurse is directed to the appropriate patient and machine. Draw a data flow diagram/ UML diagram for such a system.

Policy and legal_Week 12

This quiz is based on the material in Chapter 7 of the text. 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

America History Assignment

 In this assignment, consider the actual words or works of an important spokesperson for their times. After reading that speaker’s words, use the provided template to write a two-page response that shares your thoughts about the work in question, the historical events happening during the time the work was produced, and the relevance of the work in the present day. Completing this assignment will give you real insight into the thoughts and feelings of an actual participant in historical events. You will also begin to see how learning from past perspectives helps us better understand the issues we face in our own time period. 

 

Topic Choices

Topic Choice 1: Frederick Douglass’s speech, “What to the Slave Is the Fourth of July?”

Topic Choice 2: Charles Dickens’s Economic Change and Consequences.

Select one of the following works to focus on for your assignment. You can find all four options in Chapter 28 of your textbook. Page numbers are indicated in the bullet points below.

  • Old Curiosity Shop (textbook page 944).
  • Sketches by Boz (textbook page 947).
  • Dombey and Son (textbook page 951).
  • Hard Times (textbook page 952).

Topic Choice 3: Women Challenge Their Audience.

Select one of the following authors to focus on for your assignment:

ERP System 2.0

You are preparing to meet with your end users to discuss possible strategies for converting their old ERP system to a new one. Propose two or three alternative strategies, and explore related examples of situations for which each approach would be preferred and required.
1000 words