CIS 527 Information Technology Risk Management STR

CIS 527 Information Technology Risk Management STR

CIS 527 Information Technology Risk Management STR

CIS 527 Information Technology Risk Management STR

CIS 527 Full Course Discussions STR
CIS 527 Week 1 Discussion STR

CIS 527 Information Technology Risk Management STR

 

 

“Risk Management” Please respond to the following:

Assess the level of risk to an organization that allows employees to use wearable devices (i.e., Google Glass, Apple Watches, Pebble, etc.) to interact with company network assets. Make sure that you directly address the level (e.g. low, medium or high) and support your assessment with a real life situation or scenario.

CIS 527 Week 2 Discussion STR

“Compliance and Ethics” Please respond to the following:

Read the article on NPR titled “U.S. Threatened to Fine Yahoo $250K a Day if it didn’t Release User Data” located at http://www.npr.org/blogs/thetwo-way/2014/09/11/347778189/u-s-threatened-to-fine-yahoo-250k-a-day-if-it-didnt-release-user-data. Then, debate the ethical conflicts that can arise with compliance. Defend one side of the argument.

I’m adding an alternative question to this week’s discussion thread. You can address this one instead of or in addition to the Yahoo case. Amazon’s Echo has been in the news recently. Read the article on NPR “As We Leave More Digital Tracks, Amazon Echo Factors in Murder Investigation” located at Echo. Then debate the ethical conflicts that can arise with compliance in this or similar cases. Choose a side, as if you were the lead attorney for that side and defend your chosen side (even if your chosen side isn’t how you totally feel is the correct response about the issue).
CIS 527 Week 3 Discussion STR

“Protected Assets” Please respond to the following:

Determine the top five (5) IT assets to include in a risk assessment for a typical manufacturing facility. Justify your selection. The emphasis here is on IT assets not general company assets.

CIS 527 Week 4 Discussion STR

“Identifying and Analyzing Vulnerabilities” Please respond to the following:

Assess the effectiveness of offering a reward to individuals external to the organization in exchange for them to identify vulnerabilities on a new technology.

CIS 527 Week 5 Discussion STR

“Risk Mitigation Security Controls” Please respond to the following:

Read the subsections of the risk mitigation security control of the Federal Financial Institution Examination Council (FFIEC) located at http://ithandbook.ffiec.gov/it-booklets/operations/risk-mitigation-and-control-implementation.aspx. Next, infer on the five (5) controls likely to be found in small community financial institutions such as credit unions. Justify your choices

CIS 527 Week 6 Discussion STR

“Risk Mitigation Plans in Multinational Organizations” Please respond to the following:

Review the locations of Google data centers presented on the following Website http://www.google.com/about/datacenters/inside/locations/. Then research at least two (2) domestic and three (3) international locations and predict five (5) risks that Google must include in their risk mitigation plans that are different depending on the geographical location of the data centers.

CIS 527 Week 7 Discussion STR

“Business Continuity Plan” Please respond to the following:

Click hereto read the Business Continuity Plan for MIT. Then, recommend two (2) additional components to improve the plan. Justify your recommendations.

CIS 527 Week 8 Discussion STR

“Disaster Recovery Plan” Please respond to the following:

Click hereto read the Disaster Recovery Plan (DRP). Next, explain its relationship to MIT’s BCP from the previous week’s discussion (Click here). Then, based on the established relationship, assess whether or not there is anything missing from the DRP. Provide a rationale for your response.

CIS 527 Week 9 Discussion STR

“Security Breach Response” Please respond to the following:

Read The Wall Street Journal’s article titled “Target Warned of Vulnerabilities Before Data Breach” located at http://online.wsj.com/articles/SB10001424052702304703804579381520736715690. Then, read Target’s response at https://corporate.target.com/about/shopping-experience/payment-card-issue-FAQ. Critique Target’s response to the security breach in the context of ethics, regulations, and best practices. If you can’t get the WSJ article an alternative is located here – http://www.usatoday.com/story/money/business/2014/02/14/target-warned-breach/5494911/.

CIS 527 Week 10 Discussion STR

“Business Impact Assessment Priorities” Please respond to the following:

Recommend one (1) consideration that in your opinion should always be considered top priority when performing a business impact analysis. Support your recommendation.

CIS 527 Week 11 Discussion STR

“Course Conclusion” Please respond to the following:

You have just completed ten (10) weeks of an introduction to networking course. Imagine you have been asked to create a one-day training course that highlights the important elements of what you have just learned within the past ten (10) weeks.

Create a hierarchy of no more or no less than five (5) of the most important topics that you believe that a one-day course entitled “IT Risk management: The Essentials Presented in One Day” should address. Provide a detailed rationale for each of the five (5) topics
CIS 527 Full Course Assignments STR
CIS 527 Week 1 uCertify Assessment 1 STR
Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Week 1 uCertify Assessment 1: Pre-Assessment (15 items)

Week Due Title
1 uCertify Assessment 1: Pre-Assessment (15 items)

Note: You are encouraged to complete the Week 1 uCertify Assessment during the first week of class. However, you may submit the completion of the Week 1 uCertify Assessment up to the end of Week 2. This extension is designed to allow for any issues you may have purchasing, registering for, and / or accessing required materials during the first week of class.

Note: Students are allotted 120 minutes to complete each uCertify Assessment.

For help on utilizing uCertify, please review the walk-through video located in your online course.

Grading of uCertify assessments is based on student participation and is not scored on the objective performance of the actual test results. Review the setup requirements, submission requirements, and grading rubric below for additional grading details.

uCertify Setup Requirements

uCertify Assessments
You must use the preset test options for the graded submission of the pre-assessment, quizzes, and post-assessment.
Note: You are encouraged to submit the results of your first attempt at completing the assessment(s).

uCertify Submission Requirements

Complete the assessment; your results will be displayed.
Select “Share your result” from the results page menu items.
Copy the URL and paste it into the assignment submission area in the Blackboard online course .
Summarize, in two to three (2-3) sentences, both your strengths and weaknesses with respect to the topics you covered in the assessment. Note: The written summary may be submitted in the assignment submission area along with the results URL, or it may be submitted as a separate attachment.
Once you have successfully pasted the results URL and included the assessment summary, you may submit your assignment for grading. Note: Failure to submit the results URL into the assignment submission area within the Blackboard online shell will result in 0 points for the assignment. Evidence of purposely skipped answers, incomplete answers, or limited effort is at the instructor’s discretion and may result in partial or incomplete credit for the assignment.

Click here to view grading rubric.
CIS 527 Week 2 Assignment STR

Assignment 1: Risk Management

It is an accepted truth that without risk there can be no gain. Every individual and organization who wants to succeed must take some risks. Risk management is not about not taking risks, but about taking risks in a controlled environment for which one must understand the risks their triggers and their consequences.

Write a four to five (4-5) page paper in which you:

Contrast risk, threat, and vulnerability.
Explain the relationship between risk and loss.
Describe risk management and assess its level of importance in information security.
Argue the need for organizations to take risks with its data (e.g., Is it a risky practice to store customer information for repeat visits.)
Describe the necessary components in any organizational risk management plan.
Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the basic concepts and need for risk management.
Describe the components of an effective organizational risk management program.
Use technology and information resources to research issues in IT risk management.
Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions.

Click here to view the grading rubric
CIS 527 Week 4 Assignment STR

Assignment 2: Assets and Risk Management

In order to successfully manage risk, one must understand risk itself and the assets at risks. The way one goes about managing risk will depend on what needs to be protected, and from what to protect it.

Write a three to four (3-4) page paper in which you:

Explain at least two (2) different risk assessment methodologies.
Describe the key approaches to identifying threats relevant to a particular organization.
Describe different types of assets that need protection.
Explain the relationship between access and risk, and identify the tradeoffs of restricting access to the organization’s assets.
Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the components of an effective organizational risk management program.
Use technology and information resources to research issues in IT risk management.
Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions.

Click here to view the grading rubric
CIS 527 Week 6 Assignment STR

Assignment 3: Threat, Vulnerability, and Exploits Assessment Practices

There are multiple ways to bring threats and vulnerabilities to light. Common practices and lessons learned can help us explore for known or common threats, but how does an organization with a unique or highly unusual setup discover its vulnerabilities? Many organizations turn to ethical hackers.
Write a four to five (4-5) page paper in which you:

Describe common tools and techniques for identifying and analyzing threats and vulnerabilities.
Critique the practice of offering rewards for discovering vulnerabilities.
Explain the risks of challenging individuals to exploit vulnerabilities in your systems.
Give your opinion on the formation of ethical hackers.
Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe techniques for identifying relevant threats, vulnerabilities, and exploits.
Use technology and information resources to research issues in IT risk management.
Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.
CIS 527 Week 8 Assignment STR

Assignment 4: Business Continuity Plan

The phrase “the show must go on” is perhaps more true in business than in performing arts. Organizations need to be prepared to run continuously regardless of environmental conditions.

For this assessment, imagine that you are the IT manager for the only print shop in a small town in Idaho. The shop is connected to the internet by satellite link. Orders are received via the internet as well as by walk-ins with portable storage drives or smart phones that can transfer files via Bluetooth network.

Write a four to five (4-5) business continuity plan (BCP) in which you:

Identify the organization’s exposure to internal and external threats.
Identify ways that the organization can maintain its risk.
Describe the foreseen security risks.
Assess the importance of training the shop personnel on security risks.
Recommend at least two (2) strategies for continually improving the quality and effectiveness of the BCP.
Analyze the organizational risks inherent in the execution of the BCP plan.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Perform a business impact analysis for a provided scenario.
Create a business continuity plan (BCP) based on the findings of a given risk assessment for an organization.
Describe the components of an effective organizational risk management program.
Use technology and information resources to research issues in IT risk management.
Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.
CIS 527 Week 9 Assignment STR

Assignment 5: Disaster Recovery Plan

This assignment consists of two (2) sections: a Disaster Recovery Plan (DRP), and a written DRP analysis. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Acme National Bank of America (ANBA) has branches in Miami, FL, Detroit, MI, New York, NY, Los Angeles, CA, Denver, CO, St. Louis, MO, and Atlanta, GA. Each branch has workstations or terminals that are connected to a central data center located in Chicago, IL. Each branch also has local servers and desktop computers that are not connected to the central data center.
Senior management is concerned about the following potential events that could affect the operations of ANBA. The events include:

Malfunctioning software
Workstations and servers malfunctions
Failed hard drives
Large-scale natural disasters such as hurricanes and earthquakes
Office fires
Computer virus outbreaks
Power outages caused by winter storm
Terrorist attacks

Section 1: Disaster Recovery Plan

Download the DRP template CIS527_A5_W9_ANBA-DRP.docx. Modify the template to create a Disaster Recovery Plan (DRP) for ANBA. Provide appropriate and accurate information for the areas outlined in the DRP template.

Section 2: Disaster Recovery Plan Analysis

2. Write a five to seven (5-7) page paper in which you:

Describe the main objectives of the ANBA DRP.
Explain the key ways that ANBA’s DRP can help mitigate risk in the organization.
Defend the need for DRPs in an enterprise organization such as ANBA.
Infer on the difference between the elements of DRP between different branches of a multinational organization.
Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization.
Use technology and information resources to research issues in IT risk management.
Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.
CIS 527 Week 10 Term Paper STR

Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Term Paper: Managing Organizational Risk

No longer than a decade ago, IT security professionals had to work hard to persuade organizational leaders about the importance of developing effective risk management plans. Nowadays, due to the plethora of cautionary tales that organizations history provide, business leaders are informed on the need to manage risk and understand the crucial role of an organization’s IT infrastructure on its ability to perform business.
A computer incident response team (CIRT) plan can help prepare organizations for incidents that might occur.

Write an eight to ten (8-10) page paper in which you:

Describe the objectives and main elements of a CIRT plan.
Analyze the manner in which a CIRT plan fits into the overall risk management approach of an organization and how it supports other risk management plans.
Provide at least two (2) examples of how CIRT plans define the who, what, when, where, and why of the response effort.
Analyze the manner in which the development of a CIRT plan enables management to adopt a more proactive approach to risk management. Include recommendations for remaining proactive in the continual improvement and update of CIRT plans.
Infer on the evolution of threats over the last decade that organizations must now consider.
Predict the evolution of regulatory requirements mandating risk management processes and plans.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Create a Computer Incident Response Team (CIRT) plan for an organization in a given scenario.
Use technology and information resources to research issues in IT risk management.
Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions

Click here to view the grading rubric
CIS 527 Week 11 uCertify Assessment 2
Students, please view the “Submit a Clickable Rubric Assignment” video in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Week 11 uCertify Assessment 2: Post-Assessment (150 items)

Week Due Title
11 uCertify Assessment 2: Post-Assessment (150 items)

Note: Students are allotted 120 minutes to complete each uCertify Assessment.

For help on utilizing uCertify, please review the walk-through video located in your online course.

Grading of uCertify assessments is based on student participation and is not scored on the objective performance of the actual test results. Review the setup requirements, submission requirements, and grading rubric below for additional grading details.

uCertify Setup Requirements

uCertify Assessments
You must use the preset test options for the graded submission of the pre-assessment, quizzes, and post-assessment.
Note: You are encouraged to submit the results of your first attempt at completing the assessment(s).

uCertify Submission Requirements

Complete the assessment; your results will be displayed.
Select “Share your result” from the results page menu items.
Copy the URL and paste it into the assignment submission area in the Blackboard online course .
Summarize, in two to three (2-3) sentences, both your strengths and weaknesses with respect to the topics you covered in the assessment. Note: The written summary may be submitted in the assignment submission area along with the results URL, or it may be submitted as a separate attachment.
Once you have successfully pasted the results URL and included the assessment summary, you may submit your assignment for grading. Note: Failure to submit the results URL into the assignment submission area within the Blackboard online shell will result in 0 points for the assignment. Evidence of purposely skipped answers, incomplete answers, or limited effort is at the instructor’s discretion and may result in partial or incomplete credit for the assignment.

Click here to view grading rubric.

Get a 10 % discount on an order above $ 50
Use the following coupon code :
NursesHomework
Open chat
1
Hello, how may I be of help?
Hello, how may I be of help?