Abu Dhabi Men’s College
COURSE CODE:CSF4003
Security and Risk Management
NAME: _________________________________________ ID #: __________________
NAME: _________________________________________ ID #: __________________
DUE DATE:5thDec, 2015
Percentage Value against total grade: 10%
ACADEMIC HONESTY DECLARATION:
This assignmentis entirely my own work except where I have duly acknowledged other sources in the text and listed those sources at the end of the assignment. I have not previously submitted this work to the HCT. I understand that I may be orally examined on my submission.
I understand that I must not attempt to gain marks dishonestly during an assessed task as this is considered cheating. Helping another student gain marks during an assessed task is also considered cheating. THE PENALTY FOR CHEATING AT HCT IS SEVERE AND INCLUDES PERMANENT DISMISSAL FROM THE COLLEGE.
I have read the above information and understand my responsibilities with regard to academic honesty during this assignment.
SIGNED: __________________________________________ DATE: ___________________
SIGNED: __________________________________________ DATE: ___________________
CSF 4003 Assignment 2
Introduction
In order to create a comprehensive and meaningful security risk profile for any organization, you must have proper understanding of the organization in question. This includes: current information, IT, and security environment; risk appetite (at the executive/C-level); risk profile of critical information resources.
The Scenario
Select a company/organization that you can gather information about (this could be your current employer, or an organization with public presence on the internet). For the organization of your choice, create the following questionnaires:
1. IT security questionnaire
2. Enterprise application security risk profile questionnaire
Risk Area Description Required Sections Target Participants
IT Security
Questionnaire
(Group) Think of it as an IT check to find out what’s in place and what’s missing regarding security of information. •
•
•
•
•
Site security
Network security
Data security
Device security
Internet security
Applications security Other: malware, policies, procedures, etc. IT Security
Team
(manager)
Application
Security Risk
Profile
Questionnaire
(Individual) The main goal of this questionnaire is to assess the risk sensitivity of a specific enterprise application for your organization. •
•
• General Information
Information Sensitivity
Regulatory
Requirements
Business Requirements
(CIAA) Application or Resource
Owner
Content Requirements
1. Provide a description of your organization
2. Provide a description of the application for the second questionnaire
3. Develop the 2 questionnaires (using any software or online tool)
4. Provide sample response data for each questionnaire
5. Provide an analysis of your sample response (what do they mean?)
6. There will be an interview for the second questionnaire where you will explain your questionnaires, the data, and the analysis
Deliverables and Marking
5 = Excellent, 4 = Very good, 3 = Satisfactory, 2 = Not very good, 1 = Poor
Company Description 0= Not done | 1= Poor | 2= Satisfactory /2
Questionnaire 1 -pre Students submitted preliminary design 0= Not done | 1= Poor | 2= Satisfactory /2
Questionnaire 1 -design /10
Questionnaire 1 –data and analysis /5
Questionnaire 2 –app description 0= Not done | 1= Poor | 2= Satisfactory /2
Questionnaire 2 -design /10
Questionnaire 2 –data and analysis /5
Interview /10
Total Mark /46
For a custom paper on the above topic, place your order now!
What We Offer:
• On-time delivery guarantee
• PhD-level writers
• Automatic plagiarism check
• 100% money-back guarantee
• 100% Privacy and Confidentiality
• High Quality custom-written paper
You May Also Like This:
- Risk management framework
- Implementing Risk Management
- Principle of Risk Management and Insurance
- Information Security Policy
- Risk Management on a Satellite Development Project
- The Enterprise Information Security Policy
- Computer Systems Security Foundations
- Management of Project Risk, Quality and Safety
- DERIVATIVES AND RISK MANAGEMENT
- Designing infrastructure and security protocols.
- Risk Management
- Auditing (Management Fraud and Audit Risk)
- Comparing Homeland Security Research Products
- Organizational Risk Management
- Ranking and treating risk
- Disaster Recovery Management
- Population At Risk(Pregnant Women at Risk In Maryland)
- computer security
- Risk analysis
- Implementing Network and Personnel Security Measures
- supporting homeland security efforts
- How can organizations develop confidence in the security of their networked systems when they have the capability to open their systems to almost any network?
- Database Management Systems
- Communicating Risk
- supply chain inventory, people, technology, and risk
- Business Risk Analysis of GPT Group and preparation of an audit strategy
- Homeland Security
- Risk: Frequency Distribution, Probabilities, and Expected Value SLP
- Work-based Project Plan – Project Management
- Analysis and the current status of security logins to DAMTSC