Describe the steps to conduct a risk assessment to achieve the goals for information security

Law Question

StyleAPA
Number of words1301
Number of sources0
SpacingDouble
PowerPoint slides0

Module 4 – Case

CYBER RISK ASSESSMENT AND CYBER INSURANCE

Case Assignment

There are various methods in conducting a risk assessment. Any method used is likely to include in some shape or form hazards, vulnerabilities, and impacts. Once completed, this risk assessment can be used to develop strategies to prepare, respond, recover, and mitigate cyber threats.

For this case, answer the following:

Describe the steps to conduct a risk assessment to achieve the goals for information security (availability, integrity, confidentiality, accountability, and assurance).

Assignment Expectations

Assignments should be 4-5 full pages, double-spaced, not counting the cover or reference page. Paper format: (a) Cover page, (b) Header, (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.

Relevance—All content is connected to the question.

Precision—Specific question is addressed. Statements, facts, and statistics are specific and accurate.

Depth of discussion—Present and integrate points that lead to deeper issues.

Breadth—Multiple perspectives and references, multiple issues/factors considered.

Evidence—Points are well-supported with facts, statistics, and references.

Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.

Clarity—Writing is concise, understandable, and contains sufficient detail or examples.

Objectivity—Avoids use of first person and subjective bias.

References—Sources are listed at the end of the paper.

Use strong credible sources – peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s).

_______________________________________________________________________________________________

Module 4 – Background

CYBER RISK ASSESSMENT AND CYBER INSURANCE

Required Reading

Boot, Max (2015, July 12). What is the greatest threat to U.S. national security? Commentary. Retrieved from https://www.commentarymagazine.com/american-societ…

Causey, B. (2013, January), How to conduct an effective IT security risk assessment. Retrieved from https://security.vt.edu/content/dam/security_vt_ed…

Hartwig, R. P. (2014). Cyber risks: The growing threat. Insurance Information Institute. Retrieved from https://www.iii.org/sites/default/files/docs/pdf/p…

Howard, T., & Cruz, J. (2017). A cyber vulnerability assessment of the U.S. Navy in the 21st Century. Retrieved from http://cimsec.org/cyber-vulnerability-assessment-u…

Romanosky, S., Ablon, L., & Kuehn, A. (2017). A content analysis of cyber insurance policies. RAND. Retrieved from https://www.rand.org/pubs/external_publications/EP…

Required Websites

Federal Emergency Management Agency (FEMA) (n.d.). Risk Assessment. Retrieved from http://www.ready.gov/risk-assessment

Risk Assessment. IT Information Technology. Retrieved from https://www.it.iastate.edu/policies/risk

Requirements: Instructions provided above and on attachment.

20210324200208hls571_mod4_ca (1)

20210324200245hls571_mod4_background (1)

Image preview for”describes the steps to conduct a risk assessment to achieve the goals for information security”

Describe the steps to conduct a risk assessment to achieve the goals for information security

Click the purchase button to get full answer.

Open chat
Hello
Contact us here via WhatsApp