Site icon Tutor Bin

ISM 4323 ABC International IT Risk Assessment Report Discussion

ISM 4323 ABC International IT Risk Assessment Report Discussion

Description

Detail instructions and example are post down below

Problem Description

ABC International is a well-known cloud data storage company of which you are the security analyst.

Recently, a spear phishing scheme led to a system compromise. After spending over $1 million eradicating

these threats and restoring the systems. Now, the CEO demands that a risk analysis be performed and a

strategic plan be drafted to reduce the company’s exposure to potential future breaches. As part of the plan,

the company want to see a plan and recommendations for assessing risks, know the possible threats and

vulnerabilities, how incidents will be responded to and what contingencies will need to be in place to manage

risks and prevent future attacks. Your job, as the security analyst, is to come up with the plan to address

these issues and provide incident response recommendations. Use the knowledge you have gained in this

course to put a report together.

Requirements

1. For references:

o You may use peer-reviewed scholarly journals, such as the Oxford Academic Journal of

Cybersecurity. You may use sources like JSTOR or Google Scholar to find articles from

these journals.

o You may use sources that come from reputable websites with .gov, .edu, or .org in the

domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia

articles may be acceptable.)

o You may also use the textbook as reference.

o You may use online Risk analysis reports as examples.

2. Your report must include at least 5 references from various sources (all your references cannot be

from the textbook)

3. There are plenty of Security Analysis examples online. We have provided an example by

Reliaquest on canvas. Most examples, including the one done by Reliaquest, are very

comprehensive. Your analysis does not have to be as comprehensive but should reflect your

understanding of the topics in this course. Please understand that this is a great practice to learn

risk analysis. Therefore, please do not copy and paste from other reports. Use the things you have

learned in this class and combine your knowledge with ideas from risk analysis examples and other

references to write your report.

4. The report should be at least 4 pages of concise, concrete, and meaningful analysis and

recommendations.

5. The report must be well-organized with the following headings:

  • Overview
  • Assets
  • o Physical Location Inventory

    o Hardware and Software Inventory

  • Threats
  • o Types of possible Threats

    o Threats Sources

    o Threat Events

  • Vulnerabilities
  • o Application Vulnerabilities

    o Operating Systems Vulnerabilities

  • IT Controls Analysis
  • Likelihood of adverse Impact
  • Risk Analysis
  • Recommendations
  • Reference
  • Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

    Exit mobile version