Project #161881 - Cyber Case Study and Analysis

Computer Tutors

Subject Computer
Due By (Pacific Time) 01/28/2017 12:00 am

Required Reading

Boot, Max (2015, Jul 12). What Is the Greatest Threat to U.S. National Security? Commentary. Retrieved from: https://www.commentarymagazine.com/american-society/military/greatest-threat-to-national-security

Causey , B. (2013, Jan), How to Conduct an Effective IT Security Risk Assessment. Retrieved from:
http://www.it.vt.edu/ctssr/risk_assessment/documents/strategy-how-to-conduct-an-effective-it-security-risk-assessment_2411470.pdf  

Singer, P.W. (2014, Jan 22). What Americans should fear in cyberspace. Los Angeles Times. Retrieved from:
http://www.latimes.com/opinion/op-ed/la-oe-singer-cyber-security-20140122-story.html#ixzz2rB3lXtNM 

Virginia Information Technologies Agency (VITA) (2006, Dec 11). ITRM Guideline SEC506-01 Appendix D – Risk Management Guideline Assessment Instructions. Retrieved from: https://vita.virginia.gov/uploadedFiles/Library/PSGs/Word_versions/Risk_Assessment_Instructions.doc

Virginia Tech (n.d.). Converged Technologies for Security, Safety, and Resilience – Information Technology Risk Assessment Resources. Retrieved from: http://www.it.vt.edu/ctssr/risk_assessment/resources.php

Required Website

Federal Emergency Management Agency (FEMA) (n.d.).  Risk Assessment. Retrieved from: http://www.ready.gov/risk-assessment

Iowa State University (n.d.). IT Information Technology Risk Assessment. Retrieved from: https://www.it.iastate.edu/policies/risk

After considering the steps and framework needed to conduct a cyber risk assessment, a case study will be considered using your organization or an example online.  Using the case study, the steps, methods, impacts, and recommendations will be surveyed, analyzed, and discussed.

For the case, answer the following questions:

  1. Do a search and find an IT risk assessment or use your organization’s assessment if one exists.  From the steps listed in Module 4 Case, assess how this risk assessment compares.
  2. What are the hazards identified and likeliness of occurrence?
  3. Discuss the assets at risk and what vulnerabilities exist.
  4. Discuss the overall organization impacts.
  5. What are the recommendations?

SLP Assignment Expectations

Assignments should be 3-5 full pages, double-spaced, not counting the cover or reference page. Paper format: (a) Cover page, (b) Header, (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.

  • Relevance—All content is connected to the question.
  • Precision—Specific question is addressed. Statements, facts, and statistics are specific and accurate.
  • Depth of discussion—Present and integrate points that lead to deeper issues.
  • Breadth—Multiple perspectives and references, multiple issues/factors considered.
  • Evidence—Points are well-supported with facts, statistics and references.
  • Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
  • Clarity—Writing is concise, understandable, and contains sufficient detail or examples.
  • Objectivity—Avoids use of first person and subjective bias.
  • References—Sources are listed at the end of the paper.

Use strong credible sources – peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s).

 

TutorRating
pallavi

out of 1971 reviews
amosmm

out of 766 reviews
PhyzKyd

out of 1164 reviews
rajdeep77

out of 721 reviews
sctys

out of 1600 reviews
sharadgreen

out of 770 reviews
topnotcher

out of 766 reviews
XXXIAO

out of 680 reviews