In order to effectively respond to applicable threats, information technology ad

In order to effectively respond to applicable threats, information technology ad

In order to effectively respond to applicable threats, information technology administrators must be able to accurately evaluate the threat environment. The ability to engage in this evaluation originates from the performance of a risk assessment. Performing a risk assessment can take on many forms. One recent method of engaging in risk assessment has come in the form of utilizing firewalls and fire wall audit tools. Through these measures, IT administrators can map the network and critically analyze where any potential vulnerabilities may lie. The outcomes of these measures results in increased awareness of the most likely types of threats that may materialize, and enables administrators to configure the network in order to mitigate and address these weaknesses and vulnerabilities.
Prompt
In Module Five, you will submit the risk assessment portion of the information assurance plan. You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?
Specifically, the following critical elements must be addressed:
Risk AssessmentAnalyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.
Evaluate the threat environment of the organization.
Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?
Assess the threats to and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.
What to Submit
Your paper must be submitted as a three to four page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.
Milestone Three Rubric
CriteriaProficient (100%)Needs Improvement (75%)Not Evident (0%)Value
Analysis of EnvironmentAnalyzes the environment in which the organization operates, including the current protocols and policies in place related to information assuranceAnalyzes the environment in which the organization operates but does not include the current protocols and policies in place related to information assuranceDoes not analyze the environment in which the organization operates20
Threat EnvironmentEvaluates the threat environment of the organizationEvaluates the threat environment of the organization but misses crucial threats or vulnerabilities , or the evaluation is inaccurateDoes not evaluate the threat environment of the organization20
Best ApproachesDiscusses best approaches for implementing information assurance principles, including areas of improvement to current protocols and policiesDiscusses best approaches for implementing information assurance principles, but does not fully develop ideas related to areas of improvement to current protocols and policiesDoes not discuss best approaches for implementing information assurance principles20
Risk MatrixCreates a risk matrix to comprehensively and accurately assess the threats to and vulnerabilities of the organization, including possible methods to mitigate the identified dangersCreates a risk matrix to assess the threats to and vulnerabilities of the organization but does not include possible methods to mitigate the identified dangers, or assessment is incomplete or inaccurateDoes not create a risk matrix to assess the threats to and vulnerabilities of the organization20
Articulation of ResponseSubmission has no major errors related to citations, grammar, spelling, syntax, or organizati onSubmission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas20
Total: 100%

In:

Struggling with your essay and deadlines?

Get this or a similar paper done in as fast as 4 hours, 24/7.

NB: We do not sell prewritten papers. All essays are written from scratch according to are specific needs and instructions.

Secure Service Plagiarism Free On-time Delivery.