Skip to main content

Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.

Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.
Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.
Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.
Describe the primary goal of the COBIT v4.1 Framework. Define COBIT.
8. On the left side of the COBIT Web site, click the COBIT 4.1 Controls Collaboration link.
9. At the top of the page, read about the COBIT Controls area within ISACA’s Knowledge Center.
10. Describe the major objective of the Controls area.
11. Scroll down the Web page to the COBIT Domains and Control Objectives section.
12. Click the Text View tab.
13. List each of the types of control objectives and briefly describe them based on the descriptions on the Web site. Include the following:
 Plan and Organize
 Acquire and Implement
 Monitor and Evaluate
 Delivery and Support
 Process Controls
 Application Controls
14. On the Web site, under the Plan and Organize Control Objective description, click the View all the PO Control Objectives link.
15. Scroll down and find the P09 Control Objectives, which are labeled Assess and Manage IT Risks.
16. Click the P09.1, IT Risk Management Framework link.
17. Scroll down to about the middle of the page to read about the IT Risk Management Framework.
18. Expand the View value and Risk Drivers and View Control Practices links to learn more.
19. Describe what this objective covers.
20. Click the other P09 Control Objectives by first clicking the back button to return to the COBIT Domains and Control Objectives section of the COBIT 4.1 Controls Collaboration page.
21. Click the Text View tab.
22. Click the View all the PO Control Objectives link.
23. Scroll down to the P09 Control Objectives.
24. Finally, click the P09.2, Establishment of Risk Context link.
25. Repeat this set of instructions for each of the other P09 listings.
26. Read about each of these.
27. Explain how you use the P09 Control Objectives to organize identified IT risks, threats, and vulnerabilities so you can then manage and remediate the risks, threats, and vulnerabilities in a typical IT infrastructure.

Comments

Popular posts from this blog

Theory: TECHNIQUE Paper

Theory: TECHNIQUE Paper (2-3 pages single spaced) Use the following outline: • Description & Rationale -- using a minimum of 2 references (should include N & N) ? what it is (categories, if applicable) ? past & current uses ? reason for using; why is it a helpful technique? • General Steps (i.e. for TPRS or chants) OR General Guidelines (i.e. for games, info-gap) • Options/Variations for all levels – a minimum of 6 with at least ½ using references ? Include discussion for how to do this virtually/synchronously online. ? Incorporate some reflection on language used along with the technique. i.e. for polls/surveys/interviews…use of question forms, reporting back to class, switching from second person to third person, reported speech forms, etc. • Annotated resources for materials to use with this technique (i.e. where to find material for Readers Theatre) – a minimum of 2 • Annotated theory & idea references for more on this technique – a minimum of 2 ? Annotations should...

After reading Hong Kingston’s “No Name Woman” one student expresses that the debilitating circumstances that women are exposed to break their spirits, render them overly submissive, and eventually drive them to give up altogether.

After reading Hong Kingston’s “No Name Woman” one student expresses that the debilitating circumstances that women are exposed to break their spirits, render them overly submissive, and eventually drive them to give up altogether. Why do you agree with? You must take a clear position, and in so doing, also explain what women gain or lose as a result of the reaction they proffer. A good introduction which maintains hook, thesis statement and argument. Three different reasons in the argument. Strong thesis statement and arguments (which must fall within the introduction) Click Here For More Details on How to Work on this Paper...... Need a Professional Writer to Work on this Paper?  Click Here and Get this Essay Done ………

Tracy, one of your friends, is in the early stages of conducting a feasibility analysis for a small business consulting company.

Tracy, one of your friends, is in the early stages of conducting a feasibility analysis for a small business consulting company. Understanding the target audience and the marketing mix is a mandatory step for achieving success in her new venture. Branding is equally important. In this assignment, you will act as a consultant to Tracy to find the best answers to her problems related to understanding the market and planning and executing the correct marketing strategies. Tasks: Respond to the following questions: How would you advise Tracy to approach the following topics? Market segmentation Selection of a target market Development of a positioning strategy You are familiar with the concept of branding and know that because her company is new, she will have to build a brand from scratch. What needs to be done in this case? Submission Details: By the due date assigned,post your responses to this Discussion Area. Through the end of module, respond to at least two of your classmates' p...