I have attached the following documents Document Preview: ObjectiveWrite a Risk Assessment Report that is 5–10 pages long and contains a required risk management matrix. Present a senior...

1 answer below »
I have attached the following documents


Document Preview:

ObjectiveWrite a Risk Assessment Report that is 5–10 pages long and contains a required risk management matrix. Present a senior management-level PowerPoint briefing consisting of no more than 10 slides. Guidelines Papers must be 5–10 pages long (this would be roughly one page per area included in the report) with 10-point font. They must be double-spaced must include a cover page, table of contents, introduction, body of the report, summary or conclusion, and works cited. Even though this is not a scientific-type writing assignment, and is mostly creative in nature, references are still very important. At least six authoritative outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page, which is titled "Works Cited." Appropriate citations are required. All DeVry University policies are in effect, including the plagiarism policy. Management Briefing (PowerPoint) is due at the end of Week 6 (resubmit to the Project Discussion topic in the Week 7 Discussion forum) of the course. Risk Assessment Report and Risk Management Matrix are due during Week 6 of this course. Any questions about the Course Project may be discussed in the weekly Q & A Discussion topic. The paper and PowerPoint are worth 190 total points and will be graded on quality of research topic, quality of paper information, use of citations, and grammar and sentence structure. Week 1 Read the first week's Course Project files in the CSPM Project Files and Hacker Project Files in Doc Sharing. To obtain the role information for either the CSMP or the hacker, go to the Doc Sharing dropdown menu. There you will see a box next to the "Select View." Click on the arrow to view the choices. Then click on the "GO" button. The case study will explore an information system and the organization in which it operates, and the current state of the information system. You will choose a scenario from either the perspective of a...



Answered Same DayDec 22, 2021

Answer To: I have attached the following documents Document Preview: ObjectiveWrite a Risk Assessment Report...

David answered on Dec 22 2021
120 Votes
Logistix – Risk assessment report
LOGISTIX – RISK
ASSESSMENT REPORT

Contents
Scenario......................................................................................................................................................... 2
System Characteristics .................................................................................................................................. 2
Risk Assessment ............
................................................................................................................................ 2
Purpose ...................................................................................................................................................... 3
Risk Assessment Methodology ................................................................................................................. 3
Risk Model ................................................................................................................................................ 4
Likelihood matrix .................................................................................................................................. 4
Magnitude of Impact ............................................................................................................................. 5
Risk Value Matrix ................................................................................................................................. 7
Vulnerability statement ............................................................................................................................. 7
Threat Statement ....................................................................................................................................... 8
Risk Management Matrix .............................................................................................................................. 8
Conclusion ................................................................................................................................................... 10
Works Cited ................................................................................................................................................. 10
Scenario
Logistix Inc. is a logistics and distribution company which manages over thousands of accounts across United
States, Mexico and Canada. The CSPM or Computer Security Program Manager is responsible to protect the
operational and physical security of Corporate Information System at Logistix.
System Characteristics
CSPM is responsible for managing corporate Wide Area Network which spans across 81 remote warehouses and
interconnecting those warehouses to the main data processing environment. The data is transferred via suppliers and
customers through a FTP bridgehead server which is located at the DMZ. Files are encrypted and copied to FTP
server through an automated replication process. The remote automation or the users connect via FTP server to
transmit and or receive the encrypted EDI Files. A major part of the data processing at the Logistix is made possible
by the twin IBM System/390 Mainframes. All the GL and Financial functions are held at mainframe platform. A
microcomputer cluster manages the following: Email routing, HRIS, File storage functions and some other value
added applications. An application layer proxy server does the job of serving the central gateway for the internet
connectivity for corporate office and the 81 warehouses. Most of the network has been designed by maintain a strict
principle of control, outsourcing and centralization. The web server of the company and al the e commerce related
functions are managed by a third party, which is not into the scope of this topology.
Risk Assessment
Definition
Risk assessment is a critical tool for Information Technology Managers that enables them to use and evaluate the
security at the IT systems which they manage. It is also used in determining the potential loss or damage to the
organizational operations, stakeholders and missions.
The risk assessment provides the IT management with the ability to:
 To provide for a sufficient level of protection for Information Technology Systems and Applications.
 Satisfy the over signing organizations
 Meet the required federal requirements for the information and system security
 Determine an acceptable level of risk.
Risk can never be fully...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here