subject
Business, 06.04.2021 01:00 AlexBeWare1210

In managing risks in an organization, professionals in the information technology (IT) department conduct research to identify threats, vulnerabilities, and threat/vulnerability pairs. Then, the IT professionals determine the likelihood of each threat occurring. The IT professionals present this information to IT management, whose role in risk management is to determine and recommend approaches to manage these risks. IT management then presents these recommendations to senior management, whose role is to allocate resources, specifically money and employees, to prepare for and respond to identified threats and vulnerabilities appropriately. This activity allows a small group of students to fulfill the role of IT professionals in a small business tasked with identifying threats, vulnerabilities, and threat/vulnerability pairs, estimate the likelihood of these threats occurring, and present this information to IT management.

Scenario:

YieldMore is a small agricultural company, which produces and sells fertilizer products. The company headquarters is in a small town in Indiana. Outside its headquarters, there are two large production facilities—one in Nebraska and other in Oklahoma. Furthermore, YieldMore employs salespersons in every state in the United States to serve its customers locally. The company has three servers located at its headquarters—an Active Directory server, a Linux application server, and an Oracle database server. The application server hosts YieldMore’s primary software application, which is a proprietary program managing inventory, sales, supply chain, and customer information. The database server manages all data stored locally with direct-attached storage.

All three sites use Ethernet-cabled local area networks (LANs) to connect the users’ Windows 7 workstations via industry-standard managed switches. The remote production facilities connect to headquarters via routers with T-1 LAN connections provided by an external Internet service provider (ISP), and share an Internet connection through a firewall at headquarters. Individual salespersons throughout the country connect to YieldMore’s network via virtual private network (VPN) software through their individual Internet connections, typically in a home office.

Required:
a. Identify threats to the seven domains of IT within the organization.
b. Identify vulnerabilities in the seven domains of IT within the organization.

ansver
Answers: 2

Another question on Business

question
Business, 22.06.2019 13:50
The retained earnings account has a credit balance of $24,650 before closing entries are made. if total revenues for the period are $77,700, total expenses are $56,900, and dividends are $13,050, what is the ending balance in the retained earnings account after all closing entries are made?
Answers: 2
question
Business, 22.06.2019 14:20
In canada, the reference base period for the cpi is 2002. by 2012, prices had risen by 21.6 percent since the base period. the inflation rate in canada in 2013 was 1.1 percent. calculate the cpi in canada in 2013. hint: use the information that “prices had risen by 21.6 percent since the base period” to find the cpi in 2012. use the inflation rate formula (inflation is the growth rate of the cpi) to find cpi in 2013, knowing the cpi in 2012 and the inflation rate. the cpi in canada in 2013 is round up your answer to the first decimal. 122.9 130.7 119.6 110.5
Answers: 1
question
Business, 23.06.2019 00:00
1. consider a two-firm industry. firm 1 (the incumbent) chooses a level of output qı. firm 2 (the potential entrant) observes qı and then chooses its level of output q2. the demand for the product is p 100 q, where q is the total output sold by the two firms which equals qi +q2. assume that the marginal cost of each firm is zero. a) find the subgame perfect equilibrium levels of qi and q2 keeping in mind that firm 1 chooses qi first and firm 2 observes qi and chooses its q2. find the profits of the two firms-n1 and t2- in the subgame perfect equilibrium. how do these numbers differ from the cournot equilibrium? b) for what level of qi would firm 2 be deterred from entering? would a rational firm 1 have an incentive to choose this level of qi? which entry condition does this market have: blockaded, deterred, or accommodated? now suppose that firm 2 has to incur a fixed cost of entry, f> 0. c) for what values of f will entry be blockaded? d) find out the entry deterring level of q, denoted by q1', a expression for firm l's profit, when entry is deterred, as a function of f. for what values of f would firm 1 use an entry deterring strategy?
Answers: 3
question
Business, 23.06.2019 02:30
Markets and competition in a perfectly competitive market, all producers sell identical goods or services. additionally, there are many buyers and sellers. because of these two characteristics, both buyers and sellers in perfectly competitive markets are pricetakers . true or false: the market for lettuce does exhibit the two primary characteristics that define perfectly competitive markets. true false
Answers: 2
You know the right answer?
In managing risks in an organization, professionals in the information technology (IT) department co...
Questions
Questions on the website: 13722359