Information Systems

III: See attached | Information Systems

See attached III.docx The purpose of the PowerPoint presentation is to show threats, vulnerabilities, and recommendations in an affinity diagram. An example of

Jun 02, 2025 0 views

Check out this sample solution our expert writers created for a client with a "write assignment" task.

See attached III.docx The purpose of the PowerPoint presentation is to show threats, vulnerabilities, and recommendations in an affinity diagram. An example of this diagram is provided in your textbook in Chapter 4. As a risk management project manager, you must identify the threats, vulnerabilities, and recommendations for ABC IT Organization's application database server. The following must be provided with speaker notes in the notes section of each slide. 1. Title Slide 2. Threat Slide 3. Vulnerability Slide 4. Recommendation Slide 5. Reference Slide Your presentation must be at least five slides in length. Slides two, three, and four must contain at least one graphic (picture, photograph, graph). Your slides must contain speaker notes. You are required to use at least three resources in your presentation, one of which must be your textbook and one must be from the CSU Online Library. Your reference slide and in-text citations must be in APA style TEXTBOOK: Gibson, D., & Igonor, A. (2022). Managing risk in information systems (3rd ed.). Jones & Bartlett Learning. https://online.vitalsource.com/#/books/9781284193633 UnitIII2.pdf SEC 4301, IS Disaster Recovery 1 Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 2. Develop an asset ranking report. 2.1 Process the five performance areas before evaluating the risk assessment. 3. Analyze an impact assessment for organization threat analysis. 3.1 Calculate which method of qualitative or quantitative that impacts critical asset(s). 3.2 Investigate the critical steps for major components for successful risk assessment impacts. Required Unit Resources Chapter 5: Defining Risk Assessment Approaches Chapter 6: Performing a Risk Assessment Unit Lesson Risk Assessment Explained You may have seen the movie or have been fortunate to see the stage play Cabaret; if not, you may have at least heard the song “Money Makes the World Go Round” sung by Liza Minnelli and Joel Grey. This analogy is about the importance of money to businesses; if the world stopped so would the cash flow. Businesses must allocate money for security funding; part of that funding or budget must address risk assessments. Without this funding, there will be no risk assessment, and the business will be subjugated to vulnerabilities that will plague the business to failure. Management must provide the best balance between the profitability of business and the survivability of risks that can harm the business. According to Gibson (2015), risk assessment is risk analysis and is responsible for identifying and evaluating risks. The risks are prioritized by management as acknowledged in the risk management program. Below are brief attributes of risk assessments. • Time: Risk assessment is dependent on time during its creation. • Monitoring: Continual monitoring of the risk management program is needed. • Controls: Safeguards effect the risk assessment (Gibson, 2015). The purpose for risk assessment is to provide management the tools to evaluate and identify controls that support the decision-making process and to assess the effectiveness of the controls (Gibson, 2015). The steps below assist management in the evaluation and identification of the risk assessment. UNIT III STUDY GUIDE Risk Assessment Concepts SEC 4301, IS Disaster Recovery 2 UNIT x STUDY GUIDE Title Figure 3.1: Five steps to identify risk assessment (Adapted from Gibson, 2015, p. 115) Critical Components Triad The above steps allow management to effectively classify the risks and control the types of threats and vulnerabilities encountered from these risks. There are three critical steps that help identify the major components that influence the successful impact of risk assessment. These steps are illustrated in Figure 3.2. In the previous unit, the scope was identified as a product or project within project management. Therefore, as a product, risk assessment scope examines what assets of the information technology infrastructure might be impacted by the threats and vulnerabilities. The scope could be one or more of the seven domains; that was covered in Unit I of this course. For instance, the System/Application Domain, as shown in Figure 3.3 below, illustrates the scope’s boundary for the risk assessment. Figure 3.2: Risk Assessment Triad (Gibson, 2015) SEC 4301, IS Disaster Recovery 3 UNIT x STUDY GUIDE Title Figure 3.4 shows the critical components that need to be identified as risk assessment impact areas for the scope. The products involved as shown in Figure 3.3 are firewalls, mainframe computer, and application and Web servers. Each of these components will need to have the single point of failure identified that is hardware in nature, software code attacks, and any controls associated with the hardware setup of each component. Figure 3.3: System/Application Domain (Gibson, 2015, p. 7) Team members from the risk assessment project must be fluent in information technology (IT) operations of the seven domains and are not part of the mitigating team or group that corrects the deficiencies that are found in the scope area. This eliminates the team members from a conflict of interest when mitigating the deficiencies. Qualitative or Quantitative Methods During the risk assessment process there are two methodologies of quantifying risks; these methods are qualitative and quantitative. Below are the differences between the two methodologies. • Qualitative: This involves subjective methodology and acts on categorical variables such as low, medium, or high, to express the possibility of risk impacts for management decision-making. Identifying the risk level is done through probability or impact opinion statements from experts (Gibson, 2015). • Quantitative: This objective methodology uses specific data, such as mathematical calculations, to arrive at a numerical decision-making process. Such formulas include single loss expectancy, annual loss expectancy, annual rate of occurrence, or safeguard values (Gibson, 2015). Challenges to Risk Assessment There are many challenges to risks, and rightly so, as each risk is dependent on the assessment type selected by management as well as the methodologies mentioned above. Such challenges are mention below: • static process technique for moving target(s), • data and resource availability, • data accuracy, • effects of impact through estimation, and • useful results that assist risk acceptance and resource allocation (Gibson, 2015). SEC 4301, IS Disaster Recovery 4 UNIT x STUDY GUIDE Title Describing the Assessment With the understanding of risk assessment and which methodology to use, we can move forward in identifying the IT asset through two primary areas in classifying the systems or processes. Therefore, if we look at Figure 3.3 System/Application Domain above, we see an application and Web server. Take the Web server for example; everyone in a typical organization will have access to the Web server. However, what type of access is granted to employees? The system administrator needs to know how the Web server operates and is configured in order to provide proper allocation of resources to the employees. This is important, as certain employees will need access to websites for purchasing equipment for the organization while others do not. Human resource (HR) employees will need full access rights to the organization’s employee website, but restricted access is given to other employees to just view their own information. Therefore, two primary focuses for any asset are operational characteristics and the mission of the system (Gibson, 2015). Identifying and Evaluating Risk Assessment Before performing the risk assessment, there are five performance areas that must be considered. These areas are illustrated in Figure 3.4 below. Figure 3.4: Performance Processes (Gibson, 2015) Management needs to assign ownership of the different areas of assets within the organizational IT infrastructure. Such ownership allows the ease of mitigating the risks when it is time to implement the risk recommendations to the assets (Gibson, 2015). Examples of ownership to IT assets are network devices, different servers (email, database, Web), user and computer management, and configuration/change management. The assignment of ownership will make it easier to stay within the risk assessment scope for the organizational assets. Information technology assets within an organization will depreciate over time. Therefore, it is imperative that critical assets be identified to be replaced since these assets will be the number one priority for risk management. The replacement cost or upgrade of the depreciated asset is known as asset valuation. The value of the asset is rated by two different viewpoints as indicated below. • Replacement value is the direct cost of replacing the asset in its entirety. • Recovery value costs involve parts that need to be replaced due to failure within the asset. Examples are cooling fans, hard drives, and input devices (Gibson, 2015). Previously, we identified threats to be any individual or software codes that can cause harm to the IT infrastructure to damage or endanger devices and/or people (Gibson, 2015). Consequently, identifying the SEC 4301, IS Disaster Recovery 5 UNIT x STUDY GUIDE Title threats is the necessary process of the threat assessment plan. Figure 3.5 below illustrates the threat attack sequence in the path for loss of impact of an asset. Figure 3.5: Threat Cycle (Adapted from Gibson, 2015, p. 149) Reviewing the organization’s historical data as well as threat modeling will ensure all threats have been identified and evaluated in the risk assessment (Gibson, 2015). Remember, vulnerabilities are the degree to which people or systems are susceptible to impairment or incompatibility of IT assets as identified in Unit II. As such, all IT assets have a variety of vulnerabilities that can affect the operation of the asset; not all vulnerabilities can cause undue harm to the assets (Gibson, 2015). Discovering a weakness in the IT asset is known as a vulnerability assessment. Gathering information about the vulnerability assessment is important. Vulnerability tools such as Retina, Nmap, and Nessus are used to scan the network of an organization for vulnerabilities. Safeguarding controls or providing security enhancements to controls are countermeasures used to prevent or reduce the threats and vulnerability attacks from hackers. Controls that affect the countermeasures are either in-place controls, meaning these controls are already part of the asset, or system or planned controls, which have an implementation date for those controls to be activated (Gibson, 2015). There are three types or categories that affect the controls that are either in-place or planned controls. These control categories are represented in Figure 3.6. SEC 4301, IS Disaster Recovery 6 UNIT x STUDY GUIDE Title Figure 3.6: Safeguard Controls (Gibson, 2015) • Procedural controls are based on certain rules and procedures that are governed by the management in the organization. • Technical controls are automatic controls that are the highpoint for safeguarding controls by computer and/or software applications that protect the systems and provide constant protection. • Physical controls, as stated, are physical in nature including locks, gates, security guards, closed- circuit TV cameras, fire suppression systems, and any hardware equipment used to control the physical environment for the organization (Gibson, 2015). Summary Once all the risk assessments have been identified, the risk management coordinator will decide which methodology to implement. The choice of methods of either qualitative or quantitative, as explain earlier in this unit, would be used to determine the assessment needs. Again, this depends on costs of the assets. If you have a cost figure, then quantitative method would be used; if there is no arbitrary cost on the asset, then the qualitative method will be employed. Information derived from the risk assessment will then be used to formulate how risks are to be mitigated and to determine best practices for performing the risk assessments. Reference Gibson, D. (2015). Managing risk in information systems (2nd ed.). Jones and Bartlett Learning. https://online.vitalsource.com/#/books/9781284107753 Suggested Unit Resources In order to access the following resources, click the links below. The following presentations will summarize and reinforce the information from Chapters 5 and 6 in your textbook. Chapter 5 PowerPoint Presentation PDF Version of Chapter 5 PowerPoint Presentation Chapter 6 PowerPoint Presentation PDF Version of Chapter 6 PowerPoint Presentation https://online.columbiasouthern.edu/bbcswebdav/xid-145286817_1 https://online.columbiasouthern.edu/bbcswebdav/xid-145286816_1 https://online.columbiasouthern.edu/bbcswebdav/xid-145286820_1 https://online.columbiasouthern.edu/bbcswebdav/xid-145286819_1 SEC 4301, IS Disaster Recovery 7 UNIT x STUDY GUIDE Title Learning Activities (Nongraded) Nongraded Learning Activities are provided to aid students in their course of study. You do not have to submit them. If you have questions, contact your instructor for further guidance and information. The following learning activities provide additional information that will assist you with the mastery of the learning objectives for this unit. Go to the CSU Online Library, and use the Discovery Search feature. Utilize the Discovery Search feature in the CSU Online Library, and type in the following phrases: “annual loss expectancy, qualitative risk, quantitative risk, risk safeguards, single point of failure, risk assessment threats.” Select and read two articles. Use the criteria of peer-reviewed article (scholarly) and less than five years old. Here is a link straight to the CSU Online Library Discovery Search. The internet can provide you with a wealth of information concerning the topics in this unit. For example, the following video is from CSU Films on Demand database and provides additional information about risk assessment. Skillbank Solutions Ltd (Producer). (1999). Risk assessment (Segment 6 of 7) [Video]. In Computer Security. Films on Demand. https://libraryresources.columbiasouthern.edu/login?auth=CAS&url=http://fod.infobase.com/PortalPla ylists.aspx?wID=273866&xtid=11727&loid=14503 The transcript for this video can be found by clicking the “Transcript” tab to the right of the video in the Films on Demand database. Check Your Knowledge These questions will help you assess whether or not you have mastered the unit content. Can you answer them without looking in the textbook? • Answer the Chapter 5 Assessment questions at the end of Chapter 5 in your textbook. After you have answered the questions, you can find out how well you did by viewing the Chapter 5 Answer Key. • Answer the Chapter 6 Assessment questions at the end of Chapter 6 in your textbook. After you have answered the questions, you can find out how well you did by viewing the Chapter 6 Answer Key. Word Search Some of this unit’s key terms and phrases (written as one word) have been hidden in the word search puzzle. Access the Unit III Word Search puzzle, and see if you can find them. http://libguides.columbiasouthern.edu/?b=p https://libraryresources.columbiasouthern.edu/login?auth=CAS&url=http://fod.infobase.com/PortalPlaylists.aspx?wID=273866&xtid=11727&loid=14503 https://online.columbiasouthern.edu/bbcswebdav/xid-145286857_1 https://online.columbiasouthern.edu/bbcswebdav/xid-145286858_1 Course Learning Outcomes for Unit III Required Unit Resources Unit Lesson Risk Assessment Explained Critical Components Triad Qualitative or Quantitative Methods Challenges to Risk Assessment Describing the Assessment Identifying and Evaluating Risk Assessment Summary Reference Suggested Unit Resources Learning Activities (Nongraded)

Need a similar assignment?

Our expert writers can help you with your specific requirements. Get started today.

Order Your Custom Solution

Get a Price Estimate

Price Estimate

Deadline.

Number of Pages.

Price: $12

Order Now

Why Students Choose Us

  • 150+ subject experts with advanced degrees
  • 100% original work with plagiarism reports
  • Secure confidentiality and data protection
  • 24/7 customer support and progress updates
  • Unlimited revisions until you're satisfied