DEVELOPING AN IT CYBER SECURITY RISK MANAGEMENT STRATEGY
In the best of worlds, an organization’s well-constructed IT security risk management strategy should be sufficiently adaptable to include emerging problems associated with cyber security. However, cyber security poses unique challenges, not only because of the types and levels of attack but also because of the variability of the attacks themselves.
RESOURCES
Be sure to review the Learning Resources before completing this activity.
Click the weekly resources link to access the resources.
WEEKLY RESOURCES
To prepare for this Assignment:
Review this week’s Learning Resources with a focus on the types of cyber security and the risk associated with cyber security.
Identify and research the components commonly associated with cyber security risk.
Include answers to the following questions:
oWhat are the types of cyber security threats?
oWhat types of categories and vulnerabilities are specific to cyber security?
oHow does risk management help to mitigate risks associated with cyber threats?
BY DAY 7
Submit a 2- to 4-page paper (not including title or references) in APA format that includes the following:
Identify the types of cyber security threats and provide a description and analysis of critical vulnerabilities that are specific to cyber security.
Distinguish the benefits of risk management and why risk management should involve the following elements: threats, exposure associated with each threat, risks of each threat occurring, cost of controls, and assessment of their effectiveness.
Include references to any sources you have used. All sources should be cited using APA style.
Refer to the Week 8 Assignment Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.
Your document should be 2–4 pages long (not including the list of references), but it is the quality of the work that is important, not the number of pages. Cite and reference all sources using APA format and style guidelines and submit in a single document.
SUBMISSION INFORMATION
Before submitting your final assignment, you can check your draft for authenticity. To check your draft, access the Turnitin Drafts from the Start Here area.
1.To submit your completed assignment, save your Assignment as WK8Assgn_LastName_Firstinitial
2.Then, click on Start Assignment near the top of the page.
3.Next, click on Upload File and select Submit Assignment for review.
LEARNING RESOURCES
Required Readings
Pimchangthong, D., & Boonjing, V. (2017). Effects of risk management practices on IT project successLinks to an external site.. Management & Production Engineering Review, 8(1), 30–37. https://doi.org/10.1016/j.proeng.2017.03.158
Document: IT Risk Management Case Study Sample Solution (PDF)Download IT Risk Management Case Study Sample Solution (PDF)
Required Media
Walden University, LLC. (2017). Incorporating cyber security in an IT security risk management environment [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 7 minutes.
Walden University, LLC. (2016). Risks in IT projects [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 6 minutes.
Walden University, LLC. (2016). IT risk management [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 6 minutes.
Walden University, LLC. (2016). IT risk management case study [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 2 minutes.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
