Chat with us, powered by LiveChat Security Risk Defined | WriteDen

Security Risk Defined

Question

Week 1 forum

Topic: Security Risk Defined

Define the purpose of a Risk Analysis, discuss the role of an asset inventory, the creation of an asset baseline, and describe how you, as an information security professional, would determine the type(s) of Security Risk Assessment(s) an organization would require, how those assessments might be structured, and why the selected assessments are useful to achieving organizational information security objectives (e.g. gap assessment, compliance audit, security audit, vulnerability scanning, penetration testing, process assessment). Provide at least two peer reviewed sources to substantiate your posting; formatted in APA 6th edition style.

Instructions: Your initial post should be at least 250 words. Please respond to at least 2 other students. Responses should be a minimum of 100 words and include direct questions. Your initial posting in response to this discussion topic is ideally posted by Wednesday to afford your peers an opportunity to review and comment on your posting. Postings on other classmate postings should be accomplished by Friday to afford your peers an opportunity to respond and for you to engage in a discussion on the points that are made. Please seek to avoid last minute postings or posts that say 'good job' or 'I agree' — we are seeking to exchange ideas and perspectives with the intent of increasing our collective knowledge.

Week 2 forum

Topic: Assessing Security Risk Preps & Metrics

Identify and define the considerations required to fully describe a security risk assessment project, identify the preparation steps required for a security risk assessment, lay present five key security metrics that are important to effective security risk assessment activities, and address why each of these components are important to the success of a security risk assessment — why is definition and planning so important to an effective assessment?

Instructions: Your initial post should be at least 250 words. Please respond to at least 2 other students. Responses should be a minimum of 100 words and include direct questions. Your initial posting in response to this discussion topic is ideally posted by Wednesday to afford your peers an opportunity to review and comment on your posting. Postings on other classmate postings should be accomplished by Friday to afford your peers an opportunity to respond and for you to engage in a discussion on the points that are made. Please seek to avoid last minute postings or posts that say 'good job' or 'I agree' — we are seeking to exchange ideas and perspectives with the intent of increasing our collective knowledge. Provide at least two peer reviewed sources to substantiate your posting; formatted in APA 6th edition style.

Week 3 forum

Topic: Project Phases of a Security Review

Explain the role of Project Management as it relates to managing Security Assessments; what are the key phases for managing a security assessment, describe each phase, explain how project management supports each phase, identify key information sources that are needed to conduct each phase of the assessment, and identify Project Management tools or documents / plans that are needed to effectively execute a security assessment project.

Instructions: Your initial post should be at least 250 words. Please respond to at least 2 other students. Responses should be a minimum of 100 words and include direct questions. Your initial posting in response to this discussion topic is ideally posted by Wednesday to afford your peers an opportunity to review and comment on your posting. Postings on other classmate postings should be accomplished by Friday to afford your peers an opportunity to respond and for you to engage in a discussion on the points that are made. Please seek to avoid last minute postings or posts that say 'good job' or 'I agree' — we are seeking to exchange ideas and perspectives with the intent of increasing our collective knowledge. Provide at least two peer reviewed sources to substantiate your posting; formatted in APA 6th edition style.

Week 4 forum

Topic: Security Controls

Identify, define and differentiate between administrative, technical and physical security controls (safeguards), give an example of each, explain how to gather data on each control, and discuss the importance of these controls to a security risk assessment — why are they important?

Instructions: Your initial post should be at least 250 words. Please respond to at least 2 other students. Responses should be a minimum of 100 words and include direct questions. Your initial posting in response to this discussion topic is ideally posted by Wednesday to afford your peers an opportunity to review and comment on your posting. Postings on other classmate postings should be accomplished by Friday to afford your peers an opportunity to respond and for you to engage in a discussion on the points that are made. Please seek to avoid last minute postings or posts that say 'good job' or 'I agree' — we are seeking to exchange ideas and perspectives with the intent of increasing our collective knowledge. Provide at least two peer reviewed sources to substantiate your posting; formatted in APA 6th edition style.

Week 5 forum

Topic: Security Risk Analysis

Imagine you are tasked with evaluating the Administrative Processes involved in hiring new employees within your organization. During a Security Risk Assessment, you identify that your organization does not have a policy which requires conducting background checks on applicants for hire. Define a background check's key components, identify how background checks can address key 'loss events', and determine whether or not this is a risk to the overall security of the organization — why or why not is the lack of background checks a liability for the organization, what regulatory issues might surface?

Instructions: Your initial post should be at least 250 words. Please respond to at least 2 other students. Responses should be a minimum of 100 words and include direct questions. Your initial posting in response to this discussion topic is ideally posted by Wednesday to afford your peers an opportunity to review and comment on your posting. Postings on other classmate postings should be accomplished by Friday to afford your peers an opportunity to respond and for you to engage in a discussion on the points that are made. Please seek to avoid last minute postings or posts that say 'good job' or 'I agree' — we are seeking to exchange ideas and perspectives with the intent of increasing our collective knowledge. Provide at least two peer reviewed sources to substantiate your posting; formatted in APA 6th edition style.

Week 6 discussion

Topic: Security Risk Mitigation

Assume that your class is the management team of a medium-size business that sells goods to consumers online. You conduct a security assessment, and identify that the information systems are vulnerable to information leakage, and that account and customer information can be stolen; in essence a breach of PII. What controls or safeguards would you recommend implementing to address this situation, how would you select a control based on effectiveness and cost, and, based on your selected control(s), what specific considerations would need to be factored into a high level implementation mitigation plan and why?

Instructions: Your initial post should be at least 250 words. Please respond to at least 2 other students. Responses should be a minimum of 100 words and include direct questions. Your initial posting in response to this discussion topic is ideally posted by Wednesday to afford your peers an opportunity to review and comment on your posting. Postings on other classmate postings should be accomplished by Friday to afford your peers an opportunity to respond and for you to engage in a discussion on the points that are made. Please seek to avoid last minute postings or posts that say 'good job' or 'I agree' — we are seeking to exchange ideas and perspectives with the intent of increasing our collective knowledge. Provide at least two peer reviewed sources to substantiate your posting; formatted in APA 6th edition style.

Week 7 forum

Topic: Assessing Security Risk & Metrics

Define, explain, and provide examples of the difference between a Quantitative and Qualitative Analysis, identify two security metrics for each analytic approach, and select one of the risk assessment methods (e.g., FAA Security Risk Management Process, OCTAVE, FRAP, CRAMM, and NSA IAM) that would effectively employ an approach useful in your current work setting — why would your selected approach be more effective?

Instructions: Your initial post should be at least 250 words. Please respond to at least 2 other students. Responses should be a minimum of 100 words and include direct questions. Your initial posting in response to this discussion topic is ideally posted by Wednesday to afford your peers an opportunity to review and comment on your posting. Postings on other classmate postings should be accomplished by Friday to afford your peers an opportunity to respond and for you to engage in a discussion on the points that are made. Please seek to avoid last minute postings or posts that say 'good job' or 'I agree' — we are seeking to exchange ideas and perspectives with the intent of increasing our collective knowledge. Provide at least two peer reviewed sources to substantiate your posting; formatted in APA 6th edition style.

Week 8 forum

Topic: Reporting Security Risks

If you could, which security reporting methodology would you recommend to promote an organizational “security culture” within your present organization to achieve an objective wherein employees and stakeholders are more knowledgeable and proactive about threats to information security?

Instructions: Your initial post should be at least 250 words. Please respond to at least 2 other students. Responses should be a minimum of 100 words and include direct questions. Your initial posting in response to this discussion topic is ideally posted by Wednesday to afford your peers an opportunity to review and comment on your posting. Postings on other classmate postings should be accomplished by Friday to afford your peers an opportunity to respond and for you to engage in a discussion on the points that are made. Please seek to avoid last minute postings or posts that say 'good job' or 'I agree' — we are seeking to exchange ideas and perspectives with the intent of increasing our collective knowledge. Provide at least two peer reviewed sources to substantiate your posting; formatted in APA 6th edition style.

Week 1 assignment

Assignment Instructions

Instructions: Select an organization of your choosing to perform an abbreviated assessment on and then write a 3-4 page information assurance security plan outline that lays out key considerations for decreasing risk and mitigating assessed vulnerabilities. The outline should contain a brief summary of the assessed challenges, a discussion of key IA considerations, options for addressing assessed risk items, and a recommended mitigation approach for each assessed risk. This assignment is intended to gain an initial application of your IA knowledge and to help you focus on the considerations you might address in your research paper. Further, the selection of a particular organizational network, system or information storage solution will set the stage for the Week 8 risk assessment case study. See the Writing Expectations contained in the Policies section of the Syllabus for specific focus areas / guidance.

Week 2 assignment

Assignment Instructions

Instructions: You must submit a Research Paper Topic in Week 2 of the course. Your topic must be related to IA Assessments and Evaluations and course objectives as outlined. That topic must be reviewed and approved by the course Professor prior to pursuing the next steps in the Research Paper process. See the Writing Expectations contained in the Policies section of the Syllabus for specific focus areas / guidance. Please be aware that this is a progressive research development process that will carry the same approved topic throughout the research paper development process and related assignments.

Week 3 assignment

Assignment Instructions

Instructions: You must submit a Research Paper Outline by the end of Week 3 of the course. Your topic must be related to IA Assessments and Evaluations and course objectives as outlined, using the approved topic submitted during Week 2. Your initial Research Paper References should be included and references must be formatted according to APA 6th Edition style guidelines. See the Writing Expectations contained in the Policies section of the Syllabus for specific focus areas / guidance. The objective of this assignment is to synthesize the various information security governance and risk management objectives to help develop the security strategy aspect of your research paper, applying the readings and discussions from the course. Development of 2-3 key information security metrics that would underpin your research is also required, with a brief description of what the metric is, how it will be measured, and why it is important or related to your security strategy.

Week 4 assignment

Assignment Instructions

Instructions: You must use a minimum of five (5) sources beyond the course textbooks in Week 4. These sources should be from industry articles, journals, academic and professional books, and case studies. You may not use Wikipedia or Webopedia or any of the ‘pedias’ as a reference. Your references must be formatted according to APA 6th Edition style guidelines. See the Writing Expectations contained in the Policies section of the Syllabus for specific focus areas / guidance. The objective of this assignment is to provide the research basis for your research paper effort, expose you to the APUS on-line library to explore peer reviewed materials acceptable for scholarly research, and offer a means to advance your overall knowledge of the information security literature holdings.You must use a minimum of five (5) reputable sources beyond the course textbooks for your research by the end of Week 4. These sources should be from industry articles, journals, academic and professional textbooks, and case studies. The key point of this exercise is to identity relevant, peer reviewed sources; cite them accurately; summarize the key points relevant to your paper; and identify how this source will contribute to your paper.

Week 5 assignment

Assignment Instructions

Instructions: The Draft Research Paper is due at the end of Week 5 of the course (6 – 8 pages not including the Cover Page or the References listing – APA 6th Edition formatting). The draft will count as 15% of the final grade and the final will count as 25% of the final grade. The paper will follow a conventional paper format (Cover page, Body of Paper with introduction, discussion / analysis / argument / body, conclusion, and references pages). See the Writing Expectations contained in the Policies section of the Syllabus for specific focus areas / guidance as well as conforming with APA 6th edition style guidelines. The objective of creating a draft research paper includes the desire to review your progress and to provide feedback on key aspects that may require additional research and / or development. As this is a progressive research paper activity, within this draft paper your cost-effective security strategy, underpinned by security metrics, should be assessing and identifying issues associated with your selected research topic discussion. Further, initial insights should be emerging at this point that will turn into recommended mitigation actions in your final research paper.

Week 6 assignment

Assignment Instructions

Instructions: This assignment will use NIST Special Publication 800-30 (available at

http://csrc.nist.gov/publications/drafts/800-30-rev1/SP800-30-Rev1-ipd.pdf

or in the Course Resources area) as its basis. The selected computing system can be your personal home network (e.g., from ISP appliance to connections within your home location), a work oriented network, or a public network (e.g., public library, commercial venue, free Wifi hotspot). In this assignment, initial creation and population of adversarial and a non-adversarial risk assessment tables patterned after Table I-5 and Table I-7 in NIST SP 800-30 will be performed. This assignment is intended to prepare for the Week 8 applied risk assessment assignment, wherein you will use these populated tables to gain insight in the selected system's risks, apply knowledge from this course, apply relevant information security metrics, and discuss the considerations that should go into an actual information security risk assessment discussion — limited to adversarial and non-adversarial threats. This means that you should fill out those two templates as a minimum as part of your The deliverable for this assignment should be a brief description of your selected information system and Tables I-5 and I-7 created and populated.

Week 7 assignment

Assignment Instructions

Instructions: The Final Research Paper is due at the end of Week 7 of the course (10 – 12 pages not including the Cover Page or the References listing – APA 6th Edition formatting). The final will count as 20% of the final grade. The paper will follow a conventional paper format (Cover page, Body of Paper with introduction, discussion / analysis / argument / body, conclusion, and references pages). See the Writing Expectations contained in the Policies section of the Syllabus for specific focus areas / guidance as well as conforming with APA 6th edition style guidelines. The objective of creating the final research paper includes the finalization of your research paper development process, describing and defending a cost-effective security strategy, and basing those upon meaningful security program metrics in order to identify information security responses and outcomes that are effective. As this is the culmination of the progressive research paper activity, you should provide your cost-effective security strategy, underpinned by security metrics, assessing and identifying issues associated with your selected research topic discussion. Further, gained insights from your research and reflection should result in recommended mitigation actions for your selected information security system.

Week 8 assignment

Assignment Instructions

Instructions: The Risk Assessment case study will use NIST Special Publication 800-30 (available at

http://csrc.nist.gov/publications/drafts/800-30-rev1/SP800-30-Rev1-ipd.pdf

or in the Course Resources area) as the basis for performing a risk assessment of a selected computing system. Using the Week 6 information wherein you selected your information system for assessment a initially populated Tables I-5 and I-7 from the NIST SP800-30, you will now finalize the creation and population of your adversarial and a non-adversarial risk assessment patterned after Table I-5 and Table I-7 in NIST SP 800-30 – this means that you should fill out those two templates as a minimum as part of your assessment – and provide discussion and analysis from that assessment. This case study will count for 10% of the final grade. This case study will be due at the end of Week 8. The case study should be between 7-8 pages long (not counting the Cover and Reference pages), the Tables can either be embedded in the text of your discussion or included as attachments to your paper, and will follow a conventional paper format (Cover page, Body of Paper with introduction, risk assessment / discussion / analysis / argument / body, conclusion, and references pages). See the Writing Expectations contained in the Policies section of the Syllabus for specific focus areas / guidance as well as conforming with APA 6th edition style guidelines.

HOW OUR WEBSITE WORKS

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of 
HIGH QUALITY & PLAGIARISM FREE.

Step 1

To make an Order you only need to click ORDER NOW and we will direct you to our Order Page at WriteDen. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
 Deadline range from 6 hours to 30 days.

Step 2

Once done with writing your paper we will upload it to your account on our website and also forward a copy to your email.

Step 3
Upon receiving your paper, review it and if any changes are needed contact us immediately. We offer unlimited revisions at no extra cost.

Is it Safe to use our services?
We never resell papers on this site. Meaning after your purchase you will get an original copy of your assignment and you have all the rights to use the paper.

Discounts

Our price ranges from $8-$14 per page. If you are short of Budget, contact our Live Support for a Discount Code. All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Please note we do not have prewritten answers. We need some time to prepare a perfect essay for you.