For the final assignment, you must design a corporate risk management plan for FSB as pa
For the final assignment, you must design a corporate risk management plan for FSB as part of their corporate security program. The format for the plan must be as follows:
- Introduction – State of the Organization
- corporate management of systems and applications
- threats every organization or institution faces in the era of mobile and cloud computing
- Organizational chart
- Network diagram
- Objectives of the Risk Management Plan – Risk Statement with a definition of IT emergencies, ranking the nature of incidents—whether they are natural, technical, human resources, or cyber-threats.
- Business Impact Analysis (BIA) for FSB
- Plan of Action and Milestones (POAM) – Action Plan for Incident
- Risk Reduction Strategies for Mobile Device Management (MDM)
- Tool recommendations
- Response and Risk Management
- Strategies to assess and mitigate risk and maintain privacy when cloud computing is used in a production environment.
- Sequence, workflow, or flowchart illustrating the steps to follow when responding to an incident.
- Steps to follow and recommended tools to use to perform a vulnerability assessment.
- Disaster Recovery Sites – Remote Locations
- IP lines redirect to a different location inside the organization (cold site).
- Temporary IT center contracted for the purposes of partial recovery of business functions (hot site).
- Inventory – Hardware and network architecture, databases, and applications—classified in criticality levels.
- Backup Strategy that documents protection and electronic files replication.
- Transfer Strategy – Steps to follow to transfer operations to a remote location.
- Testing Plan for implementing drills, including frequency and results reporting.
- Plan Distribution
- User Awareness and Training of Emergency Committee Personnel
Length: 15-17 page technical paper – APA
References: Minimum of 10 scholarly resources
Resources:
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015, June 1). Security in cloud computing: Opportunities and challenges. Information Science, 305, 357-383.
Brennan, J. (2018). The role of intelligence in corporate security. Security Solutions for Enterprise Security Leaders, 55(5), 22.
Georg, L. (2017). Information security governance: Pending legal responsibilities of non-executive boards. Journal of Management & Governance, 21(4),
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
