Assignment 2: Identifying Potential Risk, Response, And Recovery Assignment 1, A Video Game Development Company Recently Hired You As An Information Security Engineer. After Viewing A Growing Number Of Reports Detailing Malicious Activity, The CIO Request

Write A Paper To Analyze A Quality-Driven Company. You May Use Your Organization For Which You Work Or Another Company With Which You Are Familiar For This Assignment, As Long As It Is Quality-Driven. Examples Of Quality-Driven Organizations Include Hilto
12/09/2019
Internal Processes Of A Company Contribute To The Company’s Overall Effectiveness. Identifying Ways To Improve Internal Processes Helps Build A Highly Efficient Organization. Root Causes Need To Be Identified.
12/09/2019

Assignment 2: Identifying Potential Risk, Response, And Recovery Assignment 1, A Video Game Development Company Recently Hired You As An Information Security Engineer. After Viewing A Growing Number Of Reports Detailing Malicious Activity, The CIO Request

Assignment 2: Identifying Potential Risk, Response, and Recovery
Assignment 1, a video game development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.
After reviewing your report, the CIO requests that you develop a follow-up plan detailing a strategy for addressing all risks (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance) identified in Assignment 1. Further, your plan should identify controls (i.e., administrative, preventative, detective, and corrective) that the company will use to mitigate each risk previously identified.
Write a four to five (4-5) page paper in which you:
For each of the three (3) or more malicious attacks and / or threats that you identified in Assignment 1, choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.
For each of the three (3) or more malicious attacks and / or threats identified in Assignment 1, develop potential controls (i.e., administrative, preventative, detective, and corrective) that the company could use to mitigate each associated risk.
Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization.
Draft a one (1) page Executive Summary that details your strategies and recommendations to the CIO (Note: The Executive Summary is included in the assignment’s length requirements).
Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA format.
Work must be original as it will be checked for plagiarism.

WhatsApp Chat with us on Whatsapp