INSTRUCTIONS: ADD BEAUTIFUL COVER PAGE Similarity report should be less than 10% See the Purdue Owl link to proper use of APA...

1 answer below »
See attached instructions. PROPER PRESENTATION and Plagiarism percent LESS THAN 5-10% COUNTS!!!



INSTRUCTIONS: ADD BEAUTIFUL COVER PAGE Similarity report should be less than 10% See the Purdue Owl link to proper use of APA https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_style_introduction.html Write a 5 page paper (1,200 or more words) in APA format. Below is a recommended outline. 1. Cover page (See APA Sample papers in www.apastyle.org OR https://owl.english.purdue.edu/owl/resource/560/01/) 2. Introduction a. A thesis statement b. Purpose of paper c. Overview of paper 3. Body (Cite sources with in-text citations.) 4. Conclusion – Summary of main points plus Lessons Learned and Recommendations 5. References – List the references you cited in the text of your paper according to APA format. (Note: Do not include references that are not cited in the text of your paper) Support all assertions with proper scholarly research, using at least 5 references (scholarly articles published in peer-reviewed academic journals). Proper APA formatting is expected (cited sources, cover page, reference page, etc.).  Your submission should be presented in the form of a business document.  Presentation counts! Microsoft Word - Case Study 2 Mercer Paints MGMT 9060 MIS Case Study #2 Hands-on MIS Mercer paints is a paint manufacturing company located in Alabama that uses a network to link its business operations. A security risk assessment that management requested identified a number of potential exposures. These exposures, their associated probabilities, and average losses are summarized in the table provided below. Use the table to answer the associate questions. In addition to potential exposures listed, identify at least three other potential threats to Mercer Paints, assign probabilities, and estimate a loss range. Hands-on Case Questions 1. Use a spreadsheet software and the risk assessment data to calculate the expected annual loss for each exposure. 2. Present your findings in the form of a chart. 3. Which control points have the greatest vulnerability? 4. Which recommendations would you make to Mercer Paints? 5. Prepare a written report that summarizes your findings? Mercer Paints Risk Assessment Exposure Probability of Occurrence (%) Average Loss ($) Malware attack 60% $75,000 Data loss 12% $70,000 Embezzlement 3% $30,000 User errors 95% $25,000 Threats from hackers 95% $90,000 Improper use by employees 5% $5,000 Power failure 15% $300,000 Grading Rubric Critical Elements Exemplary (3) Good (2) Fair (1) Poor (0) Use a spreadsheet software and the risk assessment data to calculate the expected. Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Present your findings in the form of a chart? Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Which control points have the greatest vulnerability? Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Which recommendations would you make to Mercer Paints? Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Prepare a written report that summarizes your findings? Question fully answered and student demonstrated original thought, high-level of understanding of material including facts and or examples that backup-up statements. Question fully answered and student demonstrated some original thought, good understanding of material including some facts and or examples that backup- up statements. Question not answered fully and student demonstrated limited original thought, an adequate understanding of material with limited facts and or examples that backup-up statements. Student did not answer this question. Management Information Systems: Managing the Digital Firm, Sixteenth Edition Management Information Systems: Managing the Digital Firm Sixteenth Edition Chapter 8 Securing Information Systems Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved If this PowerPoint presentation contains mathematical equations, you may need to check that your computer has the following installed: 1) MathType Plugin 2) Math Player (free versions available) 3) NVDA Reader (free versions available) 1 Learning Objectives 8.1 Why are information systems vulnerable to destruction, error, and abuse? 8.2 What is the business value of security and control? 8.3 What are the components of an organizational framework for security and control? 8.4 What are the most important tools and technologies for safeguarding information resources? 8.5 How will M I S help my career? Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved This chapter discusses the need for security to guard information systems and data, as well as technologies used to secure information systems. Ask students what types of threats can harm an information system. Internet security, or the lack thereof, will continue to be a topic of major concern to corporations and countries. Ask students why there is so much attention paid to Internet security issues in the press. Ask if anyone has been a victim of a breach in computer security. 2 Video Cases Case 1: Stuxnet and Cyberwarfare Case 2: Cyberespionage: The Chinese Threat Instructional Video 1: Sony PlayStation Hacked; Data Stolen from 77 Million Users Instructional Video 2: Meet the Hackers: Anonymous Statement on Hacking Sony Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved 3 Hackers Target the U.S. Presidential Election: What Happened? (1 of 2) Problem Weak network security Limited financial resources Solutions Malware detection technology Isolate systems and networks Prevent unauthorized access Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved 4 Hackers Target the U.S. Presidential Election: What Happened? (2 of 2) Hackers took advantage of uneven security and controls and loose management structure to attack the Clinton campaign Demonstrates vulnerabilities in information technology systems Illustrates some of the reasons organizations need to pay special attention to information system security Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved 5 Why Systems are Vulnerable (1 of 2) Security Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems Controls Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved This slide introduces the need for both security and controls in today’s businesses in order to safeguard information systems. Ask students to give an example of security technique and an example of a control that might be used in a business. 6 Why Systems are Vulnerable (2 of 2) Accessibility of networks Hardware problems (breakdowns, configuration errors, damage from improper use or crime) Software problems (programming errors, installation errors, unauthorized changes) Disasters Use of networks/computers outside of firm’s control Loss and theft of portable devices Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved This slide discusses the main categories of threats to information systems. Note that when large amounts of data are stored digitally on computers and servers and in databases, they are vulnerable to many more kinds of threats than when they were stored in manual form, on paper in folders and file cabinets. When data are available over a network, there are even more vulnerabilities. Ask students if they have ever lost data on their computers. What was the reason (hardware, software, “disaster,” other people, etc.). On the other hand, digital records are not vulnerable in ways that manual records in a file cabinet are vulnerable. For instance, you really can’t tell who has accessed manual records, or when, in a physical file. In a database, file access is monitored (unless a hacker has found a way to read records without leaving a digital trail). 7 Figure 8.1 Contemporary Security Challenges and Vulnerabilities Copyright © 2020, 2018, 2016 Pearson Education, Inc. All Rights Reserved Figure 8.1, Page 298. The architecture of a web-based application typically includes a web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. This graphic illustrates the types of threats to system security and the points over the network at which these threats are prevalent. Some problems occur at the client computer, others through the network lines, corporate servers, or in corporate hardware and software. Full description: A diagram shows the common threats against contemporary information systems. The diagram shows the corporate servers connected to the client, or users, through communication lines at one end and to the
Answered 4 days AfterMar 29, 2021

Answer To: INSTRUCTIONS: ADD BEAUTIFUL COVER PAGE Similarity report should be less than 10% See the Purdue Owl...

Ali Asgar answered on Apr 03 2021
156 Votes
Information Security Risk mitigation
2
Information Security Risk mitigation
A Quantitative Analysis of various Information Security Risks
(
April 3, 2021
Student Name
Student Class and ID
)
Table of Contents
Introduction    2
A Thesis Statement    2
Purpose of Paper    2
Overview of Paper    2
Body    3
1.    Calculation of Expected Annual Loss for Each Exposure
    3
2.    Chart depicting the Risk Assessment and Expected Annual Loss    3
3.    Greatest Vulnerability Control Points    4
4.    Recommendation to Mercer Paints    5
Conclusion    6
References    7
Introduction
A Thesis Statement
Risk Management is done to manage optimal security at reasonable cost. A quantitative risk analysis is done to measure the impact of any risk in monetary term to create a management level report that weighs the benefits of risk handling and implementation of counter measures.
Purpose of Paper
A security risk assessment was undertaken on management’s request at Mercer Paints, a paint manufacturing company in Alabama. The company uses network to link its business operations. The risk assessment identified a number of potential threats and exposures.
The purpose of this document is to analyze this risk assessment data and convert it into a quantifiable risk analysis that can be presented to the management to get approval for resources required for mitigation of these risks.
A quantitative analysis in terms of tabulated data and charts is being presented to highlight the primary areas of concern so that optimal security can be implemented at reasonable cost.    
Overview of Paper
An Information Security Risk Assessment is done to facilitate the quantification of Risks in terms of economic and reputational loss to the company so as to better focus on the threats that needs urgent attention and mark some of the risks are residual acceptable risks that the security team need not worry about much.
In the absence of such a quantitative analysis, the security team resources and organization’s management might be spending time and money to mitigate risks that are either very rare to occur or may not even be relevant to the organization’s business line and thus would be a waste.
This document analyzes the data collected by the Security Risk Assessment that was requested by the management earlier, to identify any potential exposures. The exposures and their associated probabilities and average losses are summarized in a tabular form in the earlier report.
This report takes that data and calculates the Annual Loss Expectancy for the specified threat to understand the threat scenario of the company.
This report also presents with recommendations to the management about the vulnerabilities that need their immediate attention and the mitigation options that must be implemented to bring the risk to an acceptable level.
Body
Mercer Paints, a paint manufacturing company located in Alabama uses a Network to link its business operation.
The management had requested a Risk assessment to identify a number of potential threats and exposures. The exposures and their associated probabilities and average loss are summarized in Table 1 below.
Table 1
    Exposure
    Probability of Occurrence (%) also called Annualized Rate of Occurrence (ARO)
    Average Loss ($) also called Single Loss Expectancy (SLE)
    Malware Attack
    60%
    $ 75,000
    Data Loss
    12%
    $ 70,000
    Embezzlement
    3%
    $ 30,000
    User Error
    95%
    $ 25,000
    Threat from Hackers
    95%
    $ 90,000
    Improper Use by employees
    5%
    $ 5,000
    Power Failure
    15%
    $ 3,00,000
1. Calculation of Expected Annual Loss for Each Exposure
The annualized loss...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here