Question: Using the same company that you used for Assignment 1, conduct an Information Security Risk Assessment and create a written report. This report will

Using the same company that you used for Assignment 1, conduct an

Using the same company that you used for Assignment 1, conduct an Information Security Risk Assessment and create a written report. This report will contain: details of the Risk Assessment process undertaken results of the Risk Assessment (expressed in business and not technical terms) suggested mitigation strategies assisting a business stakeholder (typically a risk or asset owner) to decide upon the appropriate strategy (expressed in business and not technical terms). The report should have the following characteristics: details: 1000-2000 words Based on your EISP, you should be able to identify -Major information assets (no more than ten and no fewer than eight) -Significant threats that may exploit vulnerabilities You must describe the threats and vulnerabilities in reasonable detail, NOT just one sentence Resultant loss/impact/consequence (you can make this up, but describe how you made it up) results: 1000-2000 words or detailed table Use FAIR-U against all the items to develop quantitative (sort-of) outcomes . mitigation strategies: 2000-4000 words Include all graphics generated/used in an Appendix. Document and explain all assumptions you made while conducting the risk analysis.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!