Discusion 11- Project Risk

Chapter 13: Project Complexity and RiskInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Provide an example of the upside of risk? How does it compare to as downside? How does an organization prepare to take the greatest advantage of an upside to risk?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13

Security in Your Lives

While we may not have had much time together discussing security, this probably reminded you of events in your life. Think about a time when you witnessed or were part of a “breach” in security. This might be a specific attack against just you, as part of a larger breach, such as your identity being stolen during a newsworthy event, or an arbitrary event from the news you choose to analyze. Discuss the event, and then discuss which of the CIA (confidentiality, integrity, and availability) principles were violated and specifically how they were violated.  

For the response to suggest an improvement or fix that might have prevented this principle violation.  

Parameters 

  • Initial responses 
    • Posts should be 250 to 300 words in length
    • Must include at least one source outside of your textbook, and it should be included in the reference list at the end of the post
    • All sources should be used in the content of the post using APA format
  • Peer responses 
    • Responses should be 100 to 150 words or more
    • Responses must be substantive and continue learning (avoid a simple “good,” “bad,” or “I agree”)
    • Attempt to find a source to support your follow-up responses 
    • For the response to suggest an improvement or fix that might have prevented this principle violation.  

Module 02 Content

 

Module 02 Content

  1. This is a template for a risk management plan. Using this template as a general overall guide, write a description of your idea for a risk plan for a company’s IT department. Be sure to name the company you are using.

    Risk_Management_Plan_II.doc

    Your assignment should meet the following requirements:

    • Be 6-8 pages long, not including the cover page and reference page.
    • Conform to APA Style.
    • Support your answers with at least one current scholarly journal article (not more than five years old). The Rasmussen Library is a great place to find resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style and APA format, start with the Writing and APA guides at the Rasmussen Library.

Discussion Reply!!! About 50 words

 

  • Review  contributions to threats and  vulnerabilities on a home network and determine if they have gaps in  their understanding.
  • Provide feedback on a classmate’s home  network security measures they are not currently using. Do you have any  other suggestions or recommendations for them?

 What threats do you need to be concerned about on your home network?

There  are a lot of threats for a home network. One major threat for home  networks is computer viruses. These are very common issues that a lot of  people deal with. viruses are very easy to get one wrong click and you  have one. viruses are very dangerous for everyone. viruses can expose  information on the devices they are on and send it to scammers. They  could also slow the device down.

What are the vulnerabilities of each of your devices on your home network?

Firewalls  are the first line of defense for the devices. If there are issues with  the firewalls the devices will be a lot easier to hack and change these  firewalls can be a point of vulnerability if they have issues. Using a  open WIFI network is also a point of vulnerability for devices. Other  people on these open network can get into the devices onto the network.

What techniques can you use to protect your devices on your home  network? (Make sure to discuss how you will protect your network traffic  on your wireless network.)

Make sure you use a firewall on the  router. You should also limit access to the network. If you let just  anybody on the network it raises the risk of getting hacked so you  should only give access to those you trust.

Discuss some home network security measures you are not currently using but may consider using
There  is one major security measure that I do not do yet but will definitely  start soon. I will start using a VPN. VPN’s encrypt your network making  it difficult to pin down the device and track.

How to Secure Your Home WIFI Network, Federal Trade Commission, May 2022, https://consumer.ftc.gov/articles/how-secure-your-home-wi-fi-network

SE942 week 2 A

After you review all course materials attached below please answer the following question.

Assignment:

Describe how organizational culture is related to project management. What type of culture promotes a strong project environment? Please give a specific example.

Week 2 Assignment – Risk Management

It is an accepted truth that without risk there can be no gain.  Every individual and organization must take some risks to succeed. Risk management is not about avoiding risks, but about taking risks in a  controlled environment. To do this, one must understand the risks, the triggers, and the consequences.

Instructions

Write a 3–4 page paper in which you:

  1. Define risk management and information security clearly.  Discuss how information security differs from information risk management.
  2. Explain security policies and how they factor into risk management.
  3. Describe at least two responsibilities for both IT and non-IT leaders in information risk management.
  4. Describe how a risk management plan can be tailored to produce information and system-specific plans.
  5. Use at least two quality resources in this assignment. Note:  Wikipedia and similar Websites do not qualify as quality resources. The  Strayer University Library is a good source of resources..

The specific course learning outcome associated with this assignment is:

  • Assess how risk is addressed through system security policies, system-specific plans, and contingency plans

IT security management

 Create a presentation (6-8 PowerPoint slides) describing how to use the SAMM v2  Toolkit to perform assessments, create a scorecard and roadmap. This presentation is to show senior leadership that how this model is applied to the  organization. The requirements for your presentation are: • Create a presentation to show senior leadership that how this model is applied to the  organization. I. Introduce and describe very briefly (for an executive briefing) i. How assessment worksheet questions and scoring are used. ii. How to use the SAMM V2 Toolkit to create these two (2) artifacts: I. Scorecard. II. Roadmaps II. Define each of the following seven (7) terms (provide a definition for , e.g. answer the  question “What is ___?”) and describe how they are used as the components in a  Maturity Level in your presentation: i. Objective, Activities, Results, Success Metrics, Costs, Personnel and Related  Levels • Requirements of the final product (e.g. page count, references, etc.): I. Presentation of 6 to 8 slides. II. At least 2 (and preferably more) APA V7 references and in-text V7 APA citations.- • Points: 100 • Unit objective/s assessed: I. Create SAMM scorecards and roadmaps II. Apply the SAMM maturity models