The Best Essay Writing Service

Get started with the best Essay Writing Service around. Simply send us your essay question, and we’ll locate an expertly qualified writer to create an answer like no other. wycieczka do czarnobyla z kijowa po polsku

IT RISK MANAGEMENTDue date:28-Aug-

IT RISK MANAGEMENTDue date:28-Aug-2017Return date:18-Sep-2017Length:2500 WordsSubmission method optionsAlternative submission methodTaskExamine the following case study: https://www.cpdp.vic.gov.au/images/content/pdf/data_security/20160628%20VPDSF%20Framework%20June%202016%20v1.0.pdf1. Use a diagram (produced by the means of using Rationale Visio or any other relevant software application of your choice) to illustrate current security risks and concerns considered by the VIC government.2. Provide detailed explanation of the diagram and identify the areas of: high medium medium-low and low risk exposure.3. Carry out comparative analysis of the Deliberate and Accidental Threats and rank those threats in order of importance. Justify your rankings not only on the basis of the case study but also by the means of doing further research and drawing upon other relevant case studies (e.g. Security guidelines for other private and public organizations) that you can identify.4. While drawing upon theories tools and patterns covered in the subject as well as your own research explain the challenges that the VIC government is going to face while deciding on whether security/risk management should be carried out internally or externally (e.g. via outsourcing).5. Explain the difference between the concepts of Risk and Uncertainty (make sure that your discussion is linked to the case considered).6. Discuss and evaluate (with examples) different approaches available to the VIC government for risk control and mitigation.RationaleThis assignment is for students to meet the following learning outcomes.be able to critically analyse the various approaches for mitigating security risk including when to use insurance to transfer IT risk;be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems firewalls and vulnerability scanners to reduce risk.

Leave a Reply

Your email address will not be published. Required fields are marked (required)