Skip to main content

CRITICAL “1” RISKS AND SHORT-TERM REMEDIATION

CRITICAL “1” RISKS AND SHORT-TERM REMEDIATION
< For each “1” risk, add the Remediation you would put into place to Mitigate/Control that risk. Then, add a Cost-Benefit Analysis to show the estimated cost of the loss versus the cost to control the loss. You will need to think about how you would mitigate/control the risk and what type of cost would be associated with that mitigation. REMOVE THIS HIGHLIGHTED TEXT BEFORE SUBMITTING THE PAPER FOR GRADING.>
The risk/threats identified are:
I. Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and others
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
II. Loss or destruction of company information due to insider threats
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
Click Here For More Details on How to Work on this Paper......
Need a Professional Writer to Work on this Paper? Click Here and Get this Essay Done ………

MAJOR “2” / MINOR “3” LONG-TERM REMEDIATION
< For each “2” risk and “3” risk, add the Remediation you would put into place to Mitigate/Control that risk. Then, add a Cost-Benefit Analysis to show the estimated cost of the loss versus the cost to control the loss.You will need to think about how you would mitigate/control the risk and what type of cost would be associated with that mitigation. REMOVE THIS HIGHLIGHTED TEXT BEFORE SUBMITTING THE PAPER FOR GRADING.>
I. Loss of company data due to hardware being removed from production systems
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
II. Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
III. Theft of company confidential information due to insider threats.
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
IV. Loss of customers or revenue due to changes in regulatory landscape that may impact operations.
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
IMPLEMENTATION PLAN
<Below are the Threats from the Project Scenario expanded to include some Risks and Weaknesses along with Domains
and Risk Impacts/Factors..>
R-T-W Domain Impacted Risk Impact / Factor
Threat:Hardware being removed from production systems
Risk: Loss of company data.
Weakness:Access Control procedures do not track location of equipment as it is moved. Hardware may not be
protected from hacking if used outside the data center.
System / Application Domain
“2” Major
Threat: Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
Risk: Loss of company information
Weakness: Software not loaded on mobile devices to lock system when notified of loss.
Workstation Domain
“2” Major
Threat:Production outages caused by various events, such as natural disasters, change management, unstable
software, and others.
Risk: Loss of customers.
Weakness: UPS systems not active to protect systems from outages.
System / Application Domain
“1” Critical
Threat: Internet threats due to company products being accessible on the Internet
Risk: Loss or destruction of company information.
Weakness: Firewalls and Intrusion Control systems not active or updated to protect systems from unauthorized
access.
LAN-to-WAN Domain
Remote Access Domain
“1” Critical
Threat: Insider threats.
Risk: Loss of company confidential information.
Weakness: Former employers, contractors or other insiders having access to company information; current employers
are not managed properly and given access to unauthorized information.
User Doman
“3” Minor
Threat: Changes in regulatory landscape that may impact operations
Risk:Loss of customers or revenue.
Weakness: Change control processes inadequate to handle changes in regulations.
System / Application Domain “3” Minor
Table 1 from Risk Assessment Plan
Click Here For More Details on How to Work on this Paper......
Need a Professional Writer to Work on this Paper? Click Here and Get this Essay Done ………

Comments

Popular posts from this blog

Tracy, one of your friends, is in the early stages of conducting a feasibility analysis for a small business consulting company.

Tracy, one of your friends, is in the early stages of conducting a feasibility analysis for a small business consulting company. Understanding the target audience and the marketing mix is a mandatory step for achieving success in her new venture. Branding is equally important. In this assignment, you will act as a consultant to Tracy to find the best answers to her problems related to understanding the market and planning and executing the correct marketing strategies. Tasks: Respond to the following questions: How would you advise Tracy to approach the following topics? Market segmentation Selection of a target market Development of a positioning strategy You are familiar with the concept of branding and know that because her company is new, she will have to build a brand from scratch. What needs to be done in this case? Submission Details: By the due date assigned,post your responses to this Discussion Area. Through the end of module, respond to at least two of your classmates' p...

Case 7.1, “His Team Gets the Best Assignments” (pp. 151–152)

Case 7.1, “His Team Gets the Best Assignments” (pp. 151–152) There have been many stories throughout history of leaders who have been corrupted by their power. The very definition of leadership as “a process by which an individual influences the group to achieve a common goal” (Northouse, 2016, p. 6) implies the power to exert influence. Leaders must exert power in order to lead, but they must also strive to understand the complexities of power. Research by French and Raven (1959) and by others (Burns, 1976; Neck & Manz, 1994) provides insight on the types, or bases, of power available to a leader, the process of choosing among those bases, and the motivations for leaders’ choices (Northouse, 2016, p. 379). Recent researchers (Barbuto & Warneke, 2014; Vevere, 2014) also explore the effectiveness of using individual bases of power in particular situations and the effects certain bases of powers have on leaders and those they lead. Armed with this information, leaders can avoid u...

Scenario: You have been promoted to senior level manager of a company with low employee morale and decreased productivity

Scenario: You have been promoted to senior level manager of a company with low employee morale and decreased productivity. You have been tasked with developing a strategic plan for the workforce to present to the CEO and other members of the leadership team.  Chosen Organization :Kaiser Permanente Hospital Create a 10- to 12-slide PowerPoint® presentation including the following:  Explain rationale for plan Discuss SWOT of organization Summarize one year plan of action Flowchart of one year plan Give an overview of Budget for plan Evaluate the potential benefit of the plan Write conclusion Proper citation of animation or graphics is required if any is used Click Here For More Details on How to Work on this Paper...... Need a Professional Writer to Work on this Paper?  Click Here and Get this Essay Done ………