Risk Management in a Business Model

Learning Objectives and Outcomes

  • Create a report documenting various aspects of how risk management impacts the business model.

Scenario

You work for a large, private health care organization that has server, mainframe, and RSA user access. For the third week in a row, Sean comes into your office at 5:00 p.m. on Friday and needs you to write a report describing some of the risks associated with not having all the security items in place. He needs you to research a generic risk management policy template and use that as a starting point to move forward. He also asked you to search for risk outcome examples from organizations similar to theirs.

You realize that your organization does not have much in the way of an information security strategy, and is missing many of what you think are critical components. Your organization is compliant with the Health Insurance Portability and Accountability Act (HIPAA) and follows other external compliance requirements. 

Assignment Requirements

Research templates, and look for risk outcome examples from organizations of a similar type as your organization. Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies. Include an introduction explaining the following: Who? What? When? Why? Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.

Submission Requirements

  • Format: Microsoft Word
  • Font: Times New Roman, 12-Point, Double-Space
  • Citation Style: Your school’s preferred style guide
  • Length: 2–3 pages

Penetration testing

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

 

1) Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Information Technology Project in APA format

Requirement attached in word file. 

Sample APA format also attached. 

Make sure you will follow the APA format strictly with Table Content and point wise. 

 

1. – What is an Information Technology Project? (Max 50 words) ”Cite the source – Use APA”

2. – What is research? (Max 100 words)  “Cite the source – Use APA”

3. – Why we need to research? (Max 50 Words)  “Cite the source – Use APA”

       3.1. – Explain what we mean by Qualitative research

       3.2. – Explain what we mean by Quantitative Research

       3.3. – What is a survey?

       3.4. – List the major parts of a research paper

       3.5. – What is a Peer Review Journal?

4. – What we need to research? (Max 50 Words)  “Cite the source – Use APA”

        4.1. – Why we need to use keywords during our Lit Review?

5. – What is a research methodology? (Max 100 Words)  “Cite the source – Use APA”

6. – What is a research design? (Max 100 Words)  “Cite the source – Use APA”

7. – What we mean by project deliverable? (Max 50 Words)  “Cite the source – Use APA”

8. – Is deadline an important aspect of a project? (Max 50 Words)  “Cite the source – Use APA”

9. – What is project limitations? (Max 50 Words)  “Cite the source – Use APA”

10. – What do we mean when we say resources? (Max 100 Words)  “Cite the source – Use APA”

11. – Why we need to apply APA Basic Citation Stiles in a research proposal? (Max 100 Words).  “Cite the source – Use APA”

12. – From our Syllabus, please explain what we mean by Academics Integrity? (Max 250 Words)  “Cite the source – Use APA”

13. – What is Plagiarism? (Max 100 Words) ”Reference the Academic Integrity from the Syllabus”

14. – What is Self-Plagiarism? (Max 50 Words)   ”Reference the Academic Integrity from the Syllabus”

To complete this assignment, the following must be observed

1. – Use only Peer-reviewed Journal to research the above questions.

2. – Adhere and apply properly the Basic Citation Styles of the APA (Use as a reference the APA Manual. Sixth Editions).

3. – If you use the ideas, concepts, and words of another author, then, you need to cite the source and give credit to the author. Not citing in-text the source will be considered Plagiarism, and you will receive zero (0) for your assignment.

4. – Do not copy and paste information. (You will receive zero (0) for your Assignment).

5. – No late submission is accepted.

6. – This is an individual assignment, not a group assignment.

7. – You need to use the Sample-APA-Paper provided to submit your assignment.

8. – Use the Sample – APA – Paper provided as a guide to submit your assignment.

      8.1.- Observe the Paper Structure and Formating.

      8.2.- Make sure you observe The Title Page and Structure.

      8.3.- Your list of reference must be per APA.

CC1 – Assignment questions

Assignment 1:

Identify and define at least three Cloud Deployment Models. What are their characteristics? What are the pros and cons?

Mandatory – Refer to the attached textbook content and use it for completing assignment. The textbook content should be visible in the assignment.

Requirement:

  1. Two page minimum (cover sheet does not count). Minimum 550 words.
  2. Double Spaced and APA Format
  3. No plagiarized content please! Attach a plagiarized report.
  4. Check for spelling mistakes!
  5. $8 max. Please bid if you agree.

  

Assignment 2:

There are three common Cloud Service Models. Define one and identify at least three cons and three pros for that particular Cloud Service Model.

Mandatory – Refer to the attached textbook content and use it for completing assignment. The textbook content should be visible in the assignment.

Requirement:

  1. Minimum 350-400 words. Cover sheet does not count.
  2. Double Spaced and APA Format
  3. No plagiarized content please! Attach a plagiarized report.
  4. Check for spelling mistakes!
  5. $5 max. Please bid if you agree.

Reading material in the textbook:

 

  • Jamsa – Chapter 1
  • Erl – Section 3.1
  • Jamsa – Chapter 2
  • Erl – Sections 4.1 and 4.2
  • Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.
  • Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.

Discussion 4

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 5  (Jamsa, 2013).

Chapter 5 topics:

  • Define and describe SSO.
  • Define and describe IDaaS.
  • Define SAML and describe its purpose.
  • Define and describe provisioning.
  • Define and describe FIDM.
  • List factors that make mobile ID management difficult.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

Computer Science

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.