Question: please write a full report Description Risk assessment is a process used to manage and improve the security of computer systems and networks in companies
Description Risk assessment is a process used to manage and improve the security of computer systems and networks in companies and organizations. This process involves answering three fundamental questions: (1). What assets do we need to protect? (2). How are those assets threatened? (3). What can we do to counter those threats? In this assignment, you are required to develop a case study that involves applying the risk assessment process to a fictional company. There are four approaches to conducting risk assessment: the baseline approach, the informal approach, the detailed approach, and the combined approach. You are required to conduct your case study using the combined approach. The risk assessment process is outlined in the following steps: Describe a fictional company whose business operations have a high dependency on IT (Company Overview and System Characterization) Identify the critical assets, as well as potential threats and vulnerabilities to those assets. Determine the likelihood of the risk, the consequences to the company, and hence the risks the company is exposed to Determine the appropriate controls that can be chosen and implemented to address the risks (Risk Register) Select and implement the appropriate controls to eliminate or at least minimize the identified risks (Risk Implementation Plan). Deliverables A PowerPoint summarizing your work on "Risk Assessment of a Fictional Company". The report must contain slides showing the description of the company, context of the risk assessment process, critical assets, risk registrar, and risk implementation plan. A set of sample PowerPoint reports prepared by former students can be found in the following google drive shared folder: https://drive.google.com/drive/folders/IlhrTB_a4kudVKE B-PGUgrpJn7RISVva?usp=sharing A video presentation of your PowerPoint report If time permits, your presentation will be made face-to-face at the time of the lecture
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
