it security risk assessment 2
Topic: IT Security Risk Assessment
Introduction (Minimum 500 words)
Steps to Completion
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper NowReview the Setting and Situation (Minimum 1000 words)
Identification and Authentication Controls
Authorization Controls
Data Security
System Security
Physical Security
End User Security
Examine Background Resources (Minimum 250 words)
Prepare the Risk Assessment Plan (Minimum 500 words) ( http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf )
Purpose of the assessment.
Scope of the assessment.
Assumptions and constraints.
Selected risk model and Analytical approach to be used.
Conduct the Assessment (Minimum 250 words)
Identity Needed Controls and Programs (Minimum 250 words)
Communicate the Overall Findings and Recommendation (Minimum 250 words)
Deliverables (Minimum 500 words)
Need to focus on while working on this topic:
Identify threats and vulnerabilities associated with information systems and assess their risks.
Formulate the appropriate security controls to address the identified threats and vulnerabilities.
Communicate to employees an awareness of security issues related to IT systems.
Evaluate organizational information systems to insure they protect the privacy of users and of customers.
Determine requirements for business continuity/disaster recovery plans and backup procedures.
References
Ross, R.(2014). Security and privacy controls for federal information systems and organizations.NIST Special Publication 800-53. Retrieved from http://dx.doi.org/10.6028/NIST.SP.800-53r4
Swanson, M., Wohl, A., Pope, L., Grance, T., Hash, J. & Thomas, R. (2002).Contingency planning guide for information technology systems.NIST Special Publication 800-34. Retrieved from http://ithandbook.ffiec.gov/media/22151/ex_nist_sp_800_34.pdf
Wilson, M. & Hash, J. (2003).Building an information technology security awareness and training program.NIST Special Publication 800-50. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf
Instructions:
Need minimum 3500 words
No plagiarism please
Need in APA format (12†Times new Roman)
Need power point presentation (Minimum 21 slides and notes for the slides)(Title and Reference pages not count)
Need outline
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.