Innovations Design Academy Questions
A) 1) In Discussion Forum 8, post your response to the following discussion topic. Reply to at least two classmates’ responses and shares informative URLs by the date indicated in the Course Calendar. Your discussion question response should be at least 200 Words, with another 50 words per reply.
Of all the standards and organizations listed in Chapter 12 in the book Fundamentals of Information Systems Security, which one did you find the most interesting. Do a little research and tell us a little more about it, in your own words.
2) Respond to at least two other students (at least 50 words each )!
Respond to two (2) students/Peers (two classmates). The responses should be at least 50 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response should not be to a peer already responded to more than twice.
B)
Project Part 3: Risk Mitigation Plan
Senior management at TechWorx ReSale allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project.
The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.
Again, you will look at the risks of these vulnerabilities being exploited as you did during the risk assessment:
Eternal blue
The Apache Http server
The REPO server
The risk you developed
PART I: For each of your risks, you need to come up with two controls or countermeasures. A good starting point would be NIST SP 800-53 which we used in week 7. The controls/countermeasures should be specific. I am not just looking for the control number. Provide the specifics on the control and replace the organizational template with what you would recommend.
PART II: What is the cost to implement these 8 controls? Consider the initial cost (equipment), facility costs, installation costs, licensing costs, training costs, and perhaps personnel costs. This should be organized by risk. Although in practice, there will be some overlapping of controls and countermeasures, for this project you can only use a control/countermeasure one time.
- Part III: Timeline to implement. Develop a realistic schedule to implement these controls and countermeasures. A graphical schedule would be very helpful.
- Part IV: Operational impact. Again address each risk individually on what, if any, operational impact will these controls/countermeasures have on the users/stakeholders or employees.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.