Research project


CLICK HERE TO DOWNLOAD THIS ANSWER  INSTANTLY $18 Only

 

Background

This is an individual research project. The objective of the research project is to develop an Information Asset Risk Assessment Report for an organization of your choosing. The analysis should be conducted using only publicly available information (that is, information obtainable on the Internet, company reports, news reports, journal articles, etc.). The risk analysis should consider legitimate, known threats that pertain to the subject organization. Based on the information gathered, presumed vulnerabilities of the company or organization’s computing and networking infrastructure will be identified. Then, based on the identified threats and vulnerabilities, you will describe the risk profile for the subject organization and suggest recommendations to mitigate the risks.

Your report should be 12 pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end.

 

Risk Assessment Report

 

The Risk Assessment Report should be a polished. Be sure to carefully cite (using correct APA-Style in-line citations) all sources of information in the report.

 

Risk Assessment Report Overview

The objective of this assignment is to develop a Risk Assessment Report for a company, government agency, or other organization (the "subject organization"). The analysis will be conducted using only publicly available information (e.g., information obtainable on the Internet, company reports, news reports, journal articles, etc.) and based on judicious, believable extrapolation of that information. Your risk analysis should consider subject organization information assets (computing and networking infrastructure), their vulnerabilities and legitimate, known threats that can exploit those vulnerabilities. Your assignment is then to derive the risk profile for the subject organization. Your report should also contain recommendations to mitigate the risks.

There is a wealth of business-oriented and technical information that can be used to infer likely vulnerabilities and assets for an organization. It is recommended that students select their organizations based at least in part on ease of information gathering, from a public record perspective.

Steps to be followed:

  1. Pick a Subject Organization: Follow these guidelines:


No insider or proprietary information. All the information you collect must be readily available for anyone to access. You will describe in your proposal how you intend to collect your information.

You should pick a company or organization that has sufficient publicly available information to support a reasonable risk analysis, particularly including threat and vulnerability identification.

  1. Develop Subject Organization Information: Examples of relevant information includes:


Company/Organization name and location

Company/Organization management or basic organization structure

Company/Organization industry and purpose (i.e., the nature of its business)

Company/Organization profile (financial information, standing in its industry, reputation)

Identification of relevant aspects of the company/organization’s computing and network infrastructure, Note: Do not try to access more information through Social Engineering, or through attempted cyber attacks or intrusion attempts.

  1. Analyze Risks


 

For the purposes of this assignment, you will follow the standard risk assessment methodology used within the U.S. federal government, as described in NIST Special Publication 800-30 (United States. National Institute of Standards and Technology  (2002). Risk Management Guide for Information Technology Systems (Special Publication 800-30). Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf)

In conducting your analysis, focus on identifying threats and vulnerabilities faced by your subject organization.

Based on the threats and vulnerabilities you identify, next determine both the relative likelihood and severity of impact that would occur should each of the threats materialize. This should produce a listing of risks, at least roughly ordered by their significance to the organization.

For the risks you have identified, suggest ways that the subject organization might respond to mitigate the risk.

  1. Prepare Risk Assessment Report


Reports should be 12 pages (exclusive of cover, title page, table of contents, endnotes and bibliography), double-spaced, and should follow a structure generally corresponding to the risk assessment process described in NIST Special Publication 800-30.

The report should be prepared using the APA Style. All sources of information should be indicated via in-line citations and a list of references.