ISM 4323 ABC International IT Risk Assessment Report Discussion
Description
Detail instructions and example are post down below
Problem Description
ABC International is a well-known cloud data storage company of which you are the security analyst.
Recently, a spear phishing scheme led to a system compromise. After spending over $1 million eradicating
these threats and restoring the systems. Now, the CEO demands that a risk analysis be performed and a
strategic plan be drafted to reduce the company’s exposure to potential future breaches. As part of the plan,
the company want to see a plan and recommendations for assessing risks, know the possible threats and
vulnerabilities, how incidents will be responded to and what contingencies will need to be in place to manage
risks and prevent future attacks. Your job, as the security analyst, is to come up with the plan to address
these issues and provide incident response recommendations. Use the knowledge you have gained in this
course to put a report together.
Requirements
1. For references:
o You may use peer-reviewed scholarly journals, such as the Oxford Academic Journal of
Cybersecurity. You may use sources like JSTOR or Google Scholar to find articles from
these journals.
o You may use sources that come from reputable websites with .gov, .edu, or .org in the
domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia
articles may be acceptable.)
o You may also use the textbook as reference.
o You may use online Risk analysis reports as examples.
2. Your report must include at least 5 references from various sources (all your references cannot be
from the textbook)
3. There are plenty of Security Analysis examples online. We have provided an example by
Reliaquest on canvas. Most examples, including the one done by Reliaquest, are very
comprehensive. Your analysis does not have to be as comprehensive but should reflect your
understanding of the topics in this course. Please understand that this is a great practice to learn
risk analysis. Therefore, please do not copy and paste from other reports. Use the things you have
learned in this class and combine your knowledge with ideas from risk analysis examples and other
references to write your report.
4. The report should be at least 4 pages of concise, concrete, and meaningful analysis and
recommendations.
5. The report must be well-organized with the following headings:
o Physical Location Inventory
o Hardware and Software Inventory
o Types of possible Threats
o Threats Sources
o Threat Events
o Application Vulnerabilities
o Operating Systems Vulnerabilities
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."