Identifying Threats and Vulnerabilities in an IT Infrastructure

 

Risk Management Fundamentals Lab #1: Identifying Threats and Vulnerabilities in an IT Infrastructure

Critical infrastructure vulnerability assessments are the foundation of the National Infrastructure Protection Plan’s risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of a terrorist attack while enabling timely, efficient response and restoration in an all-hazards post-event situation.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

cloud computing

What is one significant data breach through the cloud that has occurred in the field you are interested in?  How was this breach launched, what was lost and how could that breach have been prevented? Minimum 700 words

Discussion

 Last week we discussed “seven hats” so why are we discussing “eight hats” this week.  As our concepts and theories evolve, we adapt our assessments to fit the new model. Kirk’s (2012) “eight hats of data visualization design” was influenced by Edward de Bono’s six thinking hats.  However, last week we discussed “seven hats.” What changed from Kirk’s 2012 book to his 2016 book? This week we will discuss the similarities and differences of Kirk’s (2012, 2016) hats 

Need help in homework

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 5 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

•  Minimum 5 references required.

Ethical Decision Making

 

Assignment Content

  1. Resource: Decision Tree Example
    Your team of international developers will be developing a publicly accessible cloud-based application which may potentially house user PII data along with information about users’ behaviors and activities (e.g., physical locations, online sites they visit, searches, purchases, etc.), and user’s intellectual property (e.g., photos, artwork, videos, etc.).

    Based on your work in Weeks 3 and 4, develop an ethical decision-making illustration or decision tree that shows ways to address each risk if an actual incident occurs. Develop an ethical policy statement of the actions your team would take, keeping a global perspective in mind.

    Using the Decision Tree Example provided as a guide, create a PowerPoint presentation containing 4 to 6 slides. Provide 1 file for the team. This example will help you develop your individual assignment in Week 5.

    Note: You may use other applications like Adobe Spark, Microsoft Sway, or Mix instead of PowerPoint.

    Submit your assignment.

Creating Company E-mail/WIFI/Internet Use Policies

Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment.

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Requirements:

– 2 pages

– No plagiarism