Article Writing Homework Help
Assignment Content A Risk Management Analyst identifies and analyzes potential issues that could negatively impact a business in order to help the business avoid or mitigate those risks.Take on the r
Assignment Content
Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
- A Risk Management Analyst identifies and analyzes potential issues that could negatively impact a business in order to help the business avoid or mitigate those risks.Take on the role of Risk Management Analyst for the organization (Sony Pictures).Using the Security Risk Mitigation Plan Template, create a 4- to 5.5-page Security Risk Mitigation Plan for the organization you chose. The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. For assignments that require use of the template, insert the completed template into the APA document. Research and include the following:
- Security Risk Mitigation Plan:
- Select and document security policies and controls.
- Create password policies.
- Document administrator roles and responsibilities.
- Document user roles and responsibilities.
- Determine authentication strategy.
- Determine intrusion detection and monitoring strategy.
- Determine virus detection strategies and protection.
- Create auditing policies and procedures.
- Develop education plan for employees on security protocols and appropriate use.
- Provide risk response.
- Avoidance
- Transference
- Mitigation
- Acceptance
- Address change Management/Version Control.
- Outline acceptable use of organizational assets and data.
- Present employee policies (separation of duties/training).
- Explain incident response.
- Incident types/category definitions
- Roles and responsibilities
- Reporting requirements/escalation
- Cyber-incident response teams
- Discuss the incident response process.
- Preparation
- Identification
- Containment
- Eradication
- Recovery
- Lessons learned