Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
5 Sources
Style:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.87
Topic:

ITM527 Mod SLP: Risk Assessment of Operation Security Domain

Coursework Instructions:

Module 1 - SLP
Risk Assessment
The following two examples demonstrate how risk assessment can be conducted in certain situations. Read briefly to get some basic ideas.
NIST (2010). Piloting Supply Chain Risk Management Practices for Federal Information Systems.
CDS Case Study. Making Information Risk Mitigation Decisions. Vincent Larcote Case Series. Case #6-0029. Center for Digital Strategies. Tuck School of Business at Dartmouth.
Practicing risk assessment fundamentals, processes and matrixes to one's own experiences offers an opportunity to apply the learning in the real world. Can you choose a particular information system security domain of your organization or industry and apply what you learned from the case readings and SLP examples? You can choose to assess comprehensively, or you can choose not to cover all the aspects of risk assessment but to focus on two or three major perspectives and go much more in depth.
SLP Assignment Expectations
Please write a 2-5 page paper titled:
"Risk Assessment for ______ (your chosen information system security domain in your chosen organization/industry): Challenges and Solutions"
Please address the following issues:
1. Special requirements of risk assessment in your chosen information system security domain in your chosen organization/industry if there are any.
2. Two or three major perspectives of risk assessment that you choose to go in depth to discuss.
3. One or two major lessons learned from the examples that you'd like apply in your own risk assessment issue here.
4. Key challenges and solutions of risk assessment.
Your assignment will be graded according to the MSITM SLP Grading Rubric, which aligns with the following expectations. (To see the rubric, go to Assessments>Rubrics. Click the arrow next to the rubric name and choose Preview.)
• Please use original writing (No Plagerism)
• Please use American URLs that can be easily verified on the web on the reference page.
• Please include the page numbers in the in text references; APA style.
• Read the background material in the attachment titled Background
• The organization is the department of the Army / Industry Federal government

Coursework Sample Content Preview:

Risk Assessment of Operation Security Domain
Name
Institutional Affiliation
Risk Assessment of Operation Security Domain
Department of Defense operations security is a critical area where information should be prevented from leaking to inappropriate personnel. The mostly affected information security domain is the operations security domain. The information security system of the army department of defense is a critical area where systems’ vulnerability to malware and illegal access may be disastrous for the department. The army operations security domain deals with implementing reasonable protections and control department resources, software and hardware. In the domain, it is critical that information systems are maintained through establishing appropriate programs for monitoring, auditing and evaluation of vulnerabilities and threats to department information systems (NIST, 2010).
The development of security architecture in the department calls for a keen understanding of the whole information system from the system configuration, hardware, and software. The information system for any department of defense contains sensitive security information that can be exposed to vulnerabilities, risks, and threats. The need for risk assessment traverses understanding of the operations security domain, such that architecture issues are addressed by applying appropriate controls and safeguards measures. Securing information systems start with protecting information systems. In the operations security area, the risk assessment is described regarding development system routine. The main issues that risk assessment in the domain is concerned with include access control, confidentiality, availability and integrity. The special requirements for the risk assessment of the operation security field is risk control and security architecture models.
Security Architecture
The three security architecture models in the domain include access control, information flow, and integrity. One important aspect of the access control of the domain of operation security is cryptography, where the only information transmitted, can be accessed and read by the intended person. The transmitted information is only readable to a suitable individual using encryption of the ciphertext (Walsh, 2009). IT is the only way of safeguarding the integrity and confidentiality of the transmitted data. The risk assessment factors include system feasibility which incorporates the identification of information systems security requirements together with regulatory elements, security standards, and internal policies. The associated risks, vulnerabilities, and threats affect the operations security domain. It is the second stage of any development cycle where software plans are made to facilitate completion of cost-benefit evaluation and analysis (Dougherty, 2010). It is the onset of planning appropriate protection level. The other important aspect of operation security is product design that entails planning security specifications such as encryption and access control provisions. The level of risk is thus determined by the intensity and the type of encryption required. In the domain of security, the underlying risks to a security system can be mitigated qui...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!