Paper in word document file


CLICK HERE TO DOWNLOAD THIS ANSWER  INSTANTLY $9.99 Only

 

Risk Assessment Report Instructions

Background

This is an individual research project. The objective of the research project is to develop an Information Asset Risk Assessment Report for an organization of your choosing. The analysis should be conducted using only publicly available information (that is, information obtainable on the Internet, company reports, news reports, journal articles, etc.). The risk analysis should consider legitimate, known threats that pertain to the subject organization. Based on the information gathered, presumed vulnerabilities of the company or organization’s computing and networking infrastructure will be identified. Then, based on the identified threats and vulnerabilities, you will describe the risk profile for the subject organization and suggest recommendations to mitigate the risks.

Project Proposal

You must submit a short (a page and half) Project Proposal, indicating the name and relevant aspect(s) of the organization you intend to use as a subject for your report. The proposal must be accompanied by an annotated bibliography. Additional details are provided below.

The project proposal should be a page and half (double spaced) description of the organization that you propose to analyze, with a summary of the scope (e.g., entire organization, key business area, major system, etc.) for the risk assessment you are expected to conduct. The proposal should identify the subject organization with a brief explanation of why you chose the subject for this assignment. The proposal should also describe the research methods to be used and anticipated sources of research information sources. Your instructor will use the proposal to provide feedback on the suitability of the proposed subject organization and the scope you propose, as well as the suitability of the proposed research methods and information sources. If you do not provide a proposal, you will be preparing their Risk Assessment Reports "at risk;" i.e., they will run the risk of delivering a report that is not suitable for this course.

 

 

An important step in developing your Risk Assessment Report will be the construction of an Annotated Bibliography. Having developed and described a subject organization and scope of analysis in the proposal, the next step is to identify and assess the value of potential research material. You should identify five (5) to six (6) significant articles relevant to your subject organization and to identifying and assessing risks in a context similar to the scope of your report. For a report of this nature you may expect to find useful sources in both business-focused (e.g., Business Source Premier, Business and Company Resource Center, ABI/Inform) and technically-focused databases (e.g., ACM Digital Library, IEEE, Gartner.com). The annotated bibliography will consist of 100-250 words per article, that describe the main ideas of the article, a discussion of the usefulness of such an article in understanding various aspects of you report, and other  comments you might have after reading the article. For each article, there should be a complete reference in APA format. Your Annotated Bibliography will then form the basis of the sources for your report. (You may also supplement the references used in your report with additional reference material.)

 

Some excellent guidance on how to prepare an annotated bibliography can be found at http://www.library.cornell.edu/okuref/research/skill28.htm.

 

 

The grading criteria for the proposal are as follows:

Organization Selected & Justification (Right Scope and Relevance)

Research methods proposed (Bibliography)

Steps to be followed:

  1. Pick a Subject Organization: Follow these guidelines:


No insider or proprietary information. All the information you collect must be readily available for anyone to access. You will describe in your proposal how you intend to collect your information.

You should pick a company or organization that has sufficient publicly available information to support a reasonable risk analysis, particularly including threat and vulnerability identification.

  1. Develop Subject Organization Information: Examples of relevant information includes:


Company/Organization name and location

Company/Organization management or basic organization structure

Company/Organization industry and purpose (i.e., the nature of its business)

Company/Organization profile (financial information, standing in its industry, reputation)

Identification of relevant aspects of the company/organization’s computing and network infrastructure, Note: Do not try to access more information through Social Engineering, or through attempted cyber attacks or intrusion attempts.

 

  1. Analyze Risks


 

For the purposes of this assignment, you will follow the standard risk assessment methodology used within the U.S. federal government, as described in NIST Special Publication 800-30 (United States. National Institute of Standards and Technology  (2002). Risk Management Guide for Information Technology Systems (Special Publication 800-30). Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf)

In conducting your analysis, focus on identifying threats and vulnerabilities faced by your subject organization.

Based on the threats and vulnerabilities you identify, next determine both the relative likelihood and severity of impact that would occur should each of the threats materialize. This should produce a listing of risks, at least roughly ordered by their significance to the organization.

For the risks you have identified, suggest ways that the subject organization might respond to mitigate the risk.