Sign In
Not register? Register Now!
Pages:
10 pages/β‰ˆ2750 words
Sources:
Check Instructions
Style:
APA
Subject:
Management
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 43.2
Topic:

SP003 RISK MANAGEMENT AND BUSINESS INFORMATION. Essay

Essay Instructions:

SP003 RISK MANAGEMENT AND BUSINESS INFORMATION
INSTRUCTION
Overview
In this Performance Task Assessment, you will analyze a case study in order to demonstrate your ability to assess information systems security, legal, and ethical risks and develop plans for mitigating information systems risks. You are strongly encouraged to use the Academic Writing Expectations Checklist when completing this Assessment.
Professional Skill: Written Communication, Critical Thinking and Information Literacy are assessed in this Competency.
Your response to this Assessment should:
• Reflect the criteria provided in the Rubric.
• Adhere to the required length.
• Conform to APA style guidelines. You may use Walden Writing Center’s APA Course Paper Template.
This Assessment requires submission of one file. Save your file as SP003_ firstinitial_lastname (for example, SP003_ J_Smith).
When you are ready to upload your completed Assessment, use the Assessment tab on the top navigation menu.
Instructions
Before submitting your Assessment, carefully review the rubric. This is the same rubric the assessor will use to evaluate your submission and it provides detailed criteria describing how to achieve or master the Competency. Many students find that understanding the requirements of the Assessment and the rubric criteria help them direct their focus and use their time most productively.
Rubric
Access the following to complete this Assessment:
• Engro Chemicals Pakistan Limited Case Study
• Academic Writing Expectations Checklist
This assessment has two-parts. Click each of the items below to complete this assessment.
Part I: Risk Management Analysis and Evaluation
Select an organization of your choice with which you are familiar, or for which you can find sufficient information about its business information systems. Identify one or more information systems for analysis. The information system(s) should be enterprise-scale and cross-functional, or linked to external suppliers, customers, or partners. For the selected business information system(s), prepare a 3- to 5-page risk management analysis and evaluation that addresses the following. In each section, make sure to support your positions with reasoning, evidence, citations, and references.
• Identify and describe global and domestic security, legal, and ethical risks related to the selected business information system(s), and their potential impacts. Include financial impacts as well as other types of impacts.
• Compare and contrast approaches to mitigating or managing the security, legal, and ethical risks you identified. Include at least two approaches to managing each risk.
Part II: Disaster Recovery and Business Continuity Planning
Select an organization of your choice with which you are familiar, or for which you can find sufficient information about its business information systems. Identify one or more information systems for analysis. The information system(s) should be enterprise-scale and cross-functional, or linked to external suppliers, customers, or partners. For the selected business information system(s), prepare a 3- to 5-page risk management analysis and evaluation that addresses the following. In each section, make sure to support your positions with reasoning, evidence, citations, and references.
• Identify and describe global and domestic security, legal, and ethical risks related to the selected business information system(s), and their potential impacts. Include financial impacts as well as other types of impacts.
• Compare and contrast approaches to mitigating or managing the security, legal, and ethical risks you identified. Include at least two approaches to managing each risk.

Essay Sample Content Preview:

Information System
Author’s Name
Institutional Affiliation
Information System
Introduction
In recent decades, innovation has become a focal sorting out the rule that courts, scholars, activists, the media, and policymakers have grasped while thinking about how the law ought to react to new technologies. As per such accentuation, varieties of legislative measures, for example, the intellectual property, data privacy of customers, telecom-technologies, and inclining rate of competition have commanded the talk on legal incentives in cultivating innovation. To be sure, another field of scholarship alluded to as "development law" has risen as a theoretical build to bring together these divergent fields of law (Traum, 2016).
Data protection is a critical aspect for the customers that hold businesses responsible. Information is the foundation of e-business. The Internet enables businesses to utilize information all the more viably, by permitting customers, suppliers, employees, and partners to gain admittance to the business data holding pertinence to the individual jobs. Ostensibly, customers can utilize the web to put orders, which can be fulfilled even more rapidly, and with less error. Providers can be locked in as requests are placed, reducing or eliminating the need for inventory, and employees can acquire timely data about business operations (Anonymous, 2013). The objective of this paper is to assess risks experienced by two organizations, PEPSICO and Wal-Mart with deployed information systems pursued by mitigation approaches.
Part I – Risk Management Analysis and Evaluation
PEPSICO – Transaction Processing System (TPS)
Risk Identification
Security. The Transaction Processing Systems (TPS) are getting increasingly accessible for businesses as the commercial commodities are for the customers. In any case, the ways to deal with the issues related to utilizing TPS in staggered secure conditions are still in the examination organized. Data theft is a major security risk in the deployment of TPS in PEPSICO. Since TPS is natured as enterprise-scale and cross-functional in the business processes of PEPSICO, internal attacks are among the top threats, mostly on the grounds that it is unbelievably easy for individuals who as of now approach sensitive data to abuse it (Carver, n.d.). Untrained or uninformed employees additionally represent a security risk, for example, easily detectable passwords for sensitive accounts or unattended devices without the presence of a responsible figure in the vicinity.
Because of cross-functional nature, errors like sending a critical document to an unrelated person can demonstrate to be adverse to data theft risks for PEPSICO. PEPSICO tends to integrate TPS-extracted data and results on cloud applications. The cloud applications can be convenient from multiple points of view since it permits PEPSICO to access information from anyplace frequently on multiple devices. In any case, this convenience additionally opens up the attack surface of the information systems to attackers, strengthening the security risks (Gartner, 2013). Arguably, the security risk of TPS deployed by PEPSICO is huge and possesses critical potential in damaging the market position of the comp...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!