DEVELOPING AN IT CYBER SECURITY RISK MANAGEMENT STRATEGY
DEVELOPING AN IT CYBER SECURITY RISK MANAGEMENT STRATEGY
In the best of worlds, an organization’s well-constructed IT security risk management strategy should be sufficiently adaptable to include emerging problems associated with cyber security. However, cyber security poses unique challenges, not only because of the types and levels of attack but also because of the variability of the attacks themselves.
RESOURCES
Be sure to review the Learning Resources before completing this activity.
Click the weekly resources link to access the resources.
WEEKLY RESOURCES
To prepare for this Assignment:
• Review this week’s Learning Resources with a focus on the types of cyber security and the risk associated with cyber security.
• Identify and research the components commonly associated with cyber security risk.
• Include answers to the following questions:
o What are the types of cyber security threats?
o What types of categories and vulnerabilities are specific to cyber security?
o How does risk management help to mitigate risks associated with cyber threats?
BY DAY 7
Submit a 2- to 4-page paper (not including title or references) in APA format that includes the following:
• Identify the types of cyber security threats and provide a description and analysis of critical vulnerabilities that are specific to cyber security.
• Distinguish the benefits of risk management and why risk management should involve the following elements: threats, exposure associated with each threat, risks of each threat occurring, cost of controls, and assessment of their effectiveness.
• Include references to any sources you have used. All sources should be cited using APA style.
Refer to the Week 8 Assignment Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.
Your document should be 2–4 pages long (not including the list of references), but it is the quality of the work that is important, not the number of pages. Cite and reference all sources using APA format and style guidelines and submit in a single document.
SUBMISSION INFORMATION
Before submitting your final assignment, you can check your draft for authenticity. To check your draft, access the Turnitin Drafts from the Start Here area.
1. To submit your completed assignment, save your Assignment as WK8Assgn_LastName_Firstinitial
2. Then, click on Start Assignment near the top of the page.
3. Next, click on Upload File and select Submit Assignment for review.
LEARNING RESOURCES
Required Readings
• Pimchangthong, D., & Boonjing, V. (2017). Effects of risk management practices on IT project successLinks to an external site.. Management & Production Engineering Review, 8(1), 30–37. https://doi.org/10.1016/j.proeng.2017.03.158
• Document: IT Risk Management Case Study Sample Solution (PDF)Download IT Risk Management Case Study Sample Solution (PDF)
Required Media
• Walden University, LLC. (2017). Incorporating cyber security in an IT security risk management environment [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 7 minutes.
• Walden University, LLC. (2016). Risks in IT projects [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 6 minutes.
• Walden University, LLC. (2016). IT risk management [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 6 minutes.
• Walden University, LLC. (2016). IT risk management case study [Video]. Walden University Canvas. https://waldenu.instructure.com
Note: The approximate length of this media piece is 2 minutes.
Optional Resources
• Kaplan, R. S., & Mikes, A. (2012, June). Managing risks: A new framework. Harvard Business Review, 90(6), 48–60. http://hbr.org
MDSC_6005_Week8_Assignment_Rubric
MDSC_6005_Week8_Assignment_Rubric
Criteria Ratings Pts
This criterion is linked to a Learning OutcomeElement 1: Types of Cyber Security Threats 30 ptsMasteryStudent provides a thorough and detailed analysis that identifies the types of Cyber Security threats and the types of vulnerabilities specific to Cyber Security. Several examples and resources support thinking.
27.9 ptsExceptionalStudent provides a detailed description of the types of Cyber Security threats and the types of categories and vulnerabilities that are specific to Cyber Security. Several examples or resources support thinking. There are one or two minor errors or details missing.
25.5 ptsCompetentStudent provides a description of the types of Cyber Security threats and the types of categories and vulnerabilities that are specific to Cyber Security. Some examples or resources support thinking. Some details are missing and/or not fully developed.
22.5 ptsDevelopingStudent provides a cursory or incomplete description with vague or missing details of the types of Cyber Security threats and the types of categories and vulnerabilities that are specific to Cyber Security. Few examples or resources support thinking. Most details are missing or lack clarity.
15 ptsUnacceptableStudent provides an incomplete or cursory description that does not directly address this element and/or meet minimal requirements.
0 ptsNot SubmittedStudent did not submit this element. 30 pts
This criterion is linked to a Learning OutcomeElement 2: Elements of Risk Management 37.5 ptsMasteryStudent provides a thorough and detailed analysis distinguishing the benefits of risk management and why risk management should involve the following elements: threats, exposure associated with each threat, risks of each threat occurring, cost of controls, and assessment of their effectiveness. Several examples and resources support thinking.
34.88 ptsExceptionalStudent provides a detailed analysis distinguishing the benefits of risk management and why risk management should involve the following elements: threats, exposure associated with each threat, risks of each threat occurring, cost of controls, and assessment of their effectiveness. Several examples or resources support thinking. There are one or two minor errors or details missing.
31.88 ptsCompetentStudent provides an analysis distinguishing the benefits of risk management and why risk management should involve the following elements: threats, exposure associated with each threat, risks of each threat occurring, cost of controls, and assessment of their effectiveness. Some examples or resources support thinking. Some details are missing and/or not fully developed.
28.13 ptsDevelopingStudent provides a cursory or incomplete analysis distinguishing the benefits of risk management and why risk management should involve the following elements: threats, exposure associated with each threat, risks of each threat occurring, cost of controls, and assessment of their effectiveness. Few examples or resources support thinking. Most details are missing or lack clarity.
18.75 ptsUnacceptableStudent provides an incomplete or cursory description that does not directly address this element and/or meet minimal requirements.
0 ptsNot SubmittedStudent did not submit this element. 37.5 pts
This criterion is linked to a Learning OutcomeElement 3: Form and Style 7.5 ptsMasteryStudent demonstrates thorough organization and writing skills by consistently applying APA format and style. Writing is well organized and grammatically correct, including complete sentences that are free of spelling errors. A Reference List with a variety of scholarly sources is provided, using APA formatting, and it matches the citations cited within the text.
6.98 ptsExceptionalStudent demonstrates thorough organization and writing skills by consistently applying APA format and style. Writing is well organized and grammatically correct, including complete sentences that are free of spelling errors. A Reference List with a variety of scholarly sources is provided, using APA formatting, and it matches the citations cited within the text—but with one or two minor errors.
6.38 ptsCompetentStudent demonstrates organization and writing skills by mostly applying APA format and style. Writing is well organized and mostly grammatically correct, including complete sentences that are mostly free of spelling errors. While a Reference List is provided and includes a variety of resources, APA formatting may be incorrect or the list may not have matched the citations cited within the text.
5.63 ptsDevelopingStudent made a cursory attempt to address but there are numerous errors, writing is difficult to read, and/or no Reference List is provided.
3.75 ptsUnacceptableStudent submission does not adhere to the writing expectations.
0 ptsNot SubmittedStudent did not submit this element. 7.5 pts
Total Points: 75
Previous
Next
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
