• Home
  • Blog
  • Research paper on risk events-refer to ppt-slide no 29-figure 2-major risks

Research paper on risk events-refer to ppt-slide no 29-figure 2-major risks

0 comments

Hi,

Review the included ISACA built risk case. You will need to complete the tasks identified in the later part of these slides labeled To Do. Re-evaluate the probability and risk level for all of the rows in table 2. When you make your decision on the new probability rating, you will need to justify this with one to two articles. When you identify the new risk level, you will need to identify two to three articles as examples or sources to justify the changes. Don’t just move it up or down, use current news and trends with similar companies to justify why you moved or even kept it the same. For each item, run a Quantitative or Qualitative risk analysis for a proposed mitigation. In other words, find a fix for each item and put a price tag with it. Decide what items are in budget and make your choice. You will add three new columns to table 2, one will be a proposed mitigation plan with budget and risk level from the FAIR methodology, and the second column will be if your risk decision (accept, mitigate, transfer, avoid)?.

Note:For figure 2,we need to add the below columns:

Risk Event,Probability,Probability reference article,probability justification,impact,overall risk rating,overall risk rating reference ,Overall risk justification with those points.

Once the research paper is done based on various Risk events mentioned in the figure table,please prepare a 7 to 10 minute brief in power-point presentation?.

Also answer these below questions in separate document.

1.What are the most important business issues and goals for Code Galore?

2.What are the factors affecting the problem related to this case?

3.What are the managerial, organizational, and technological issues and resources related to this case?

4.What role do different decision makers play in the overall planning, implementing and managing of the information technology/security applications?

5.What are some of the emerging IT security technologies that should be considered in solving the problem related to the case?

6.In what major ways and areas can information security help the business in reaching its goals?

7.Which of the confidentiality, integrity and availability (CIA) triad is most critical to Code Galore’s business goals, and why?

8.Change leads to risk, and some significant changes have occurred. Which of these changes lead to the greatest risk?

9.Imagine that three of the greatest risk events presented themselves in worst-case scenarios. What would be some of these worst-case scenarios?

10.How can the CSO in this scenario most effectively communicate newly and previously identified risk events that have grown because of the changes to senior management??

Attached the ppt and the PDF doc for your reference

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}