SlideShare una empresa de Scribd logo
1 de 24
ISOL 533 - Information Security and Risk Management
Risk Management Plan
University of the Cumberlands
Executive Summary
<Review the Scenario on Page #2 of the publisher’s Project:
Risk Management Plan. Summarize the information about the
company provided in the scenario and place it into this section
of the report. Remove these instructions and all other
instructions below before submitting the document for
grading.>
This Risk Management Plan covers the Risks, Threats and
Weaknesses of the Health Network, Inc. (Health Network).Risks
- Threats – Weaknesses within each domain
<Using the Threats listed on Page #3 of the publisher’s Project:
Risk Management Plan and the 7 Domains diagram on Page #3
of this template, complete the table on Page #2 of this template
(review your Lab #1 solution). Once you enter the Threats into
the table, list one or more Weaknesses that might exist in a
typical organization using research and your imagination) and
then list the Risk to the company if the Threat exploits that
Weakness. Then group these Risks-Threats-Weaknesses (R-T-
W) by Domain and discuss them below in this section.>
User Domain: <list each User Domain R-T--W identified in the
table>
Workstation Domain: <list each Workstation Domain R-T--W
identified in the table>
LAN Domain: <list each User Domain R-T--W identified in the
table>
WAN-to-LAN Domain: <list each Workstation Domain R-T--W
identified in the table>
WAN Domain: <list each User Domain R-T--W identified in the
table>
Remote Access Domain: <list each Workstation Domain R-T--W
identified in the table>
System/Application Domain: <list each User Domain R-T--W
identified in the table>Compliance Laws and Regulations
<List the laws and regulations that affect this industry.>
…
Your Organization
.
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
Enter details about the organization and it IT Infrastructure.
•
•
•
organization
division
organization's
organizational
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
organization .
organization
organization d
organization'
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
organization changes to the
systems, applications and organizational data can undermine the
organization's
violations of federal or state mandates and laws can
lead to major . potential to impact the
organization
organization
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
organization
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
central respoitory accessible via the
orporate
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
organization
organization
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
ISOL 533 - InfoSecurity & Risk
Management University of the Cumberlands
RegisterRisk Register#RiskImpact on ProjectCost
$LikelihoodImpact Mitigating ActionsContingencyRisk
OwnerDeadline101<Identify the risk>Brief description of risk
and impact on costs, schedule etc$Very
UnlikelyNegligible<Describe what is currently done on the
project to reduce the impact of the risk.><Describe the course
of action if the risk does materialize: alternate solution,
reduction in functionality etc.>Person
responsibleMM/DD/YY102<Identify the risk>Brief description
of risk and impact on costs, schedule
etc$UnlikelyMarginal<Describe what is currently done on the
project to reduce the impact of the risk.><Describe the course
of action if the risk does materialize: alternate solution,
reduction in functionality etc.>Person
responsibleMM/DD/YY103<Identify the risk>Brief description
of risk and impact on costs, schedule etc$Moderately
LikelySignificant<Describe what is currently done on the
project to reduce the impact of the risk.><Describe the course
of action if the risk does materialize: alternate solution,
reduction in functionality etc.>Person
responsibleMM/DD/YY104<Identify the risk>Brief description
of risk and impact on costs, schedule
etc$LikelyCritical<Describe what is currently done on the
project to reduce the impact of the risk.><Describe the course
of action if the risk does materialize: alternate solution,
reduction in functionality etc.>Person
responsibleMM/DD/YY105<Identify the risk>Brief description
of risk and impact on costs, schedule etc$Very
LikelyCrisis<Describe what is currently done on the project to
reduce the impact of the risk.><Describe the course of action if
the risk does materialize: alternate solution, reduction in
functionality etc.>Person responsibleMM/DD/YY106<Identify
the risk>Brief description of risk and impact on costs, schedule
etc$Very UnlikelyNegligible<Describe what is currently done
on the project to reduce the impact of the risk.><Describe the
course of action if the risk does materialize: alternate solution,
reduction in functionality etc.>Person
responsibleMM/DD/YY107<Identify the risk>Brief description
of risk and impact on costs, schedule
etc$UnlikelyMarginal<Describe what is currently done on the
project to reduce the impact of the risk.><Describe the course
of action if the risk does materialize: alternate solution,
reduction in functionality etc.>Person
responsibleMM/DD/YY108<Identify the risk>Brief description
of risk and impact on costs, schedule etc$Moderately
LikelySignificant<Describe what is currently done on the
project to reduce the impact of the risk.><Describe the course
of action if the risk does materialize: alternate solution,
reduction in functionality etc.>Person
responsibleMM/DD/YYBRisk Identifier—a descriptive name or
number. Use this for tracking across project
documentsCIdentify the risk and relevant triggers that may
cause the risk to be realizedDDiscuss the potential impact this
risk may have on costs and/or scheduleEIdentify the cost
associated with this riskFLikelihood is a measure of the
probability of the event occurring: Very Unlikely, Unlikely,
Moderately Likely, Likely, Very LikelyGImpact measures the
effect on scope, cost, and/or schedule -- Negligible, Marginal,
Significant, Critical, or Crisis.HRisk Level is the resultant of
Likelihood and Impact Low, Moderate, or High.ISpecify
planned mitigation strategies: Preventative (implement
immediately) OR Contingency (implement if/when risk
occurs)JIdentify who is responsible for undertaking each
mitigation action(s)KIdentify the status of the risk: Open,
Closed, New etc
1
2
3
4
5
6
A
B
C
D
#
Risk
Impact on Project
101
<Identify the risk>
Brief description of risk and impact on costs, schedule etc
102
<Identify the risk>
Brief description of risk and impact on costs, schedule etc
103
<Identify the risk>
Brief description of risk and impact on costs, schedule etc
Risk Register
Health Network, Inc.
HNetPay
Payment
Database
View Bill –
Make Secure
Payments
View Bill -
Make Secure
Payments
HNetConnect Directory
Database
Doctors
Update
Profile
Customers
Query
HNetExchange
Message Server
(Primary Revenue)
Hospitals
(Customer)
Send Secure
Messages
Clinics
(Customer)
Receive Secure
Messages
View Bill -
Make Secure
Payments
Credit Card Processing Organization
Update
Profile
View Bill -
Make Secure
Payments
Update
Profile
Corporate Offices
Minneapolis
Arlington
Portland
650 Laptops/Mobile Devices
Data Centers
*Minneapolis
*Arlington
*Portland
1000 Servers
Loss of company data due to hardware removed from production
systems
Loss of customers due to production outages
Internet threats due to accessibility via internet
Loss of company information due to lost/stolen laptops/mobile
devices
Insider threats
Change in regulatory landscape impacting operations
Internet
Web
Server
(HNetConnect)
Application
Server
(HNetPay)
Database
Firewall
Email/Message
Server
(HNetExchange)
Credit Card Processing Organization
Users
Health Network, Inc.
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1
Deliverables
As discussed in this course, risk management is an important
process for all organizations. This is particularly true in
information systems, which provides critical support for
organizational missions. The heart of risk management is a
formal
risk management plan. The project activities described in this
document allow you to fulfill the role of an employee
participating in the risk management process in a specific
business situation.
The project is structured as follows:
Project Part Deliverable
Project Part 1 Task 1: Risk Management Plan
Task 2: Risk Assessment Plan
Task 3: Risk Mitigation Plan
Project Part 2 Task 1: Business Impact Analysis (BIA) Plan
Task 2: Business Continuity Plan (BCP)
Task 3: Disaster Recovery Plan (DRP)
Task 4: Computer Incident Response Team (CIRT) Plan
Submission Requirements
All project submissions should follow this format:
-point, double-space
Scenario
You are an information technology (IT) intern working for
Health Network, Inc. (Health Network), a fictitious health
services organization headquartered in Minneapolis, Minnesota.
Health Network has over 600 employees throughout the
organization and generates $500 million USD in annual
revenue. The company has two additional locations in Portland,
Oregon and Arlington, Virginia, which support a mix of
corporate operations. Each corporate facility is located near a
co-
location data center, where production systems are located and
managed by third-party data center hosting vendors.
Company Products
Health Network has three main products: HNetExchange,
HNetPay, and HNetConnect.
HNetExchange is the primary source of revenue for the
company. The service handles secure electronic medical
messages that originate from its customers, such as large
hospitals, which are then routed to receiving customers such as
clinics.
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 2
HNetPay is a Web portal used by many of the company’s
HNetExchange customers to support the management of
secure payments and billing. The HNetPay Web portal, hosted
at Health Network production sites, accepts various forms
of payments and interacts with credit-card processing
organizations much like a Web commerce shopping cart.
HNetConnect is an online directory that lists doctors, clinics,
and other medical facilities to allow Health Network
customers to find the right type of care at the right locations. It
contains doctors’ personal information, work addresses,
medical certifications, and types of services that the doctors and
clinics offer. Doctors are given credentials and are able
to update the information in their profile. Health Network
customers, which are the hospitals and clinics, connect to all
three of the company’s products using HTTPS connections.
Doctors and potential patients are able to make payments
and update their profiles using Internet-accessible HTTPS Web
sites.
Information Technology Infrastructure Overview
Health Network operates in three production data centers that
provide high availability across the company’s products.
The data centers host about 1,000 production servers, and
Health Network maintains 650 corporate laptops and
company-issued mobile devices for its employees.
Threats Identified
Upon review of the current risk management plan, the following
threats were identified:
ata due to hardware being removed from
production systems
-
owned assets, such as mobile devices and laptops
various events, such as natural disasters, change
management, unstable software, and so on
the Internet
Management Request
Senior management at Health Network has determined that the
existing risk management plan for the organization is out
of date and a new risk management plan must be developed.
Because of the importance of risk management to the
organization, senior management is committed to and supportive
of the project to develop a new plan. You have been
assigned to develop this new plan.
Additional threats other than those described previously may be
discovered when re-evaluating the current threat
landscape during the risk assessment phase.
The budget for this project has not been defined due to senior
management’s desire to react to any and all material risks
that are identified within the new plan. Given the company’s
annual revenue, reasonable expectations can be determined.
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 3
Project Part 1 Task 1: Risk Management Plan
For the first part of the assigned project, you must create an
initial draft of the final risk management plan. To do so, use
the template provided in class:
Evaluation Criteria and Rubrics
competencies covered in the course thus far?
management plan in the outline?
decision-making skills in identifying key components
and compliance laws and regulations?
id the student create a professional, well-developed draft
with proper grammar, spelling, and punctuation?
Project Part 1 Task 2: Risk Assessment Plan
After creating an initial draft of the risk management plan, the
second part of the assigned project requires you to create a
draft of the risk assessment (RA) plan. To do so, use the
template provided in class:
Evaluation Criteria and Rubrics
competencies covered in the course relating to risk
assessments?
plan in the outline?
decision-making skills in identifying key components
and methodologies?
ate a professional, well-developed draft
with proper grammar, spelling, and punctuation?
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 4
Project Part 1 Task 3: Risk Mitigation Plan
Senior management at Health Network allocated funds to
support a risk mitigation plan, and have requested that the risk
manager and team create a plan in response to the deliverables
produced within the earlier phases of the project. The risk
mitigation plan should address the identified threats described
in the scenario for this project, as well as any new threats
that may have been discovered during the risk assessment. You
have been assigned to develop this new plan using the
template provided in class.
Evaluation Criteria and Rubrics
-quality risk mitigation plan
based on material provided in the course?
parts of the project to build out a risk mitigation plan?
-developed draft
with proper grammar, spelling, and punctuation?
Project Part 2 Task 1: Business Impact Analysis (BIA) Plan
This part of the project is a continuation of Project Part 1 in
which you prepared an RA plan and a risk mitigation plan for
Health Network. Senior management at the company has
decided to allocate funds for a business impact analysis (BIA).
Because of the importance of risk management to the
organization, senior management is committed to and supportive
of
performing a BIA. You have been assigned to develop the BIA
plan.
Evaluation Criteria and Rubrics
instructor regarding feedback on submitted work?
identify critical business functions, identify critical
resources, identify MAO and impact, and identify recovery
objectives?
reate a professional, well-developed report
with proper grammar, spelling, and punctuation?
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 5
Project Part 2 Task 2: Business Continuity Plan (BCP)
After having reviewed and being impressed by your business
impact analysis (BIA), senior management at Health
Network has decided that your team must also develop a BCP.
Management has allocated all funds for a BCP and your
team has their full support, as well as permission to contact any
of them directly for participation or inclusion in your BCP
plan. You have been assigned to develop this new plan.
Winter storms on the East Coast have affected the ability of
Health Network employees to reach the Arlington offices in a
safe and timely manner. However, no BCP plan currently exists
to address corporate operations. The Arlington office is
the primary location for business units, such as Finance, Legal,
and Customer Support. Some of the corporate systems,
such as the payroll and accounting applications, are located
only in the corporate offices. Each corporate location is able
to access the other two, and remote virtual private network
(VPN) exist between each Production data center and the
corporate locations.
The corporate systems are not currently being backed up and
should be addressed in the new plan. The BCP should also
include some details regarding how the BCP will be tested.
You may refer to the following additional resources to help you
and your team develop a BCP, and you may use a BCP
template if found during your research.
References:
Questions (Protiviti, 2013),
http://www.protiviti.com/en-US/Documents/Resource-
Guides/Guide-to-BCM-Third-Edition-Protiviti.pdf
http://www.ready.gov/business/implementation/continuity
Evaluation Criteria and Rubrics
student develop a BCP that could recover business
operations while efforts are ongoing to restart
pervious operations?
during their research?
oncepts
presented in class?
processes?
-developed report
with proper grammar, spelling, and punctuation?
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 6
Project Part 2 Task 3: Disaster Recovery Plan (DRP)
Your project on risk management, the BIA, and the BCP have
been well received by senior management at Health
Network. They now want you to develop a DRP in order to
overcome any mishaps that might occur in the future. You may
research and use National Institute of Standards and Technology
(NIST) templates to develop a DRP plan for the
company.
Evaluation Criteria and Rubrics
operations while efforts are ongoing to restart
pervious operations?
research?
presented in class?
-developed report
with proper grammar, spelling, and punctuation?
Project Part 2 Task 4: Computer Incident Response Team
(CIRT) Plan
By now you should have developed an RA, a risk mitigation
plan, and a BIA, BCP, and DRP.
In this part of the project, you will create a CIRT plan for
Health Network. The company headquarters (HQ) handles all
incidents because the information security organization is
located in Minneapolis, so the plan will have its roots at HQ.
Make sure to incorporate your instructor’s feedback on earlier
submissions if applicable to the CIRT plan.
Evaluation Criteria and Rubrics
consider the inputs provided in their earlier
submissions?
-developed report
with proper grammar, spelling, and punctuation?
ISOL 533 - Information Security and Risk Management            R.docx

Más contenido relacionado

Similar a ISOL 533 - Information Security and Risk Management R.docx

Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMWajahat Ali Khan
 
اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222nashaat algrara
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementKuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementTorsten Koerting
 
Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides SlideTeam
 
Risk Mitigation Strategies PowerPoint Presentation Slides
Risk Mitigation Strategies PowerPoint Presentation SlidesRisk Mitigation Strategies PowerPoint Presentation Slides
Risk Mitigation Strategies PowerPoint Presentation SlidesSlideTeam
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesIRJET Journal
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)ishan parikh production
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Mitigation Plan PowerPoint Presentation Slides
Mitigation Plan PowerPoint Presentation SlidesMitigation Plan PowerPoint Presentation Slides
Mitigation Plan PowerPoint Presentation SlidesSlideTeam
 
Running Head EXECUTIVE SUMMARY6Executive SummaryS.docx
Running Head EXECUTIVE SUMMARY6Executive SummaryS.docxRunning Head EXECUTIVE SUMMARY6Executive SummaryS.docx
Running Head EXECUTIVE SUMMARY6Executive SummaryS.docxcowinhelen
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
Mitigation Plan Powerpoint Presentation Slides
Mitigation Plan Powerpoint Presentation SlidesMitigation Plan Powerpoint Presentation Slides
Mitigation Plan Powerpoint Presentation SlidesSlideTeam
 
Risk Evaluation And Mitigation Strategies PowerPoint Presentation Slide
Risk Evaluation And Mitigation Strategies PowerPoint Presentation SlideRisk Evaluation And Mitigation Strategies PowerPoint Presentation Slide
Risk Evaluation And Mitigation Strategies PowerPoint Presentation SlideSlideTeam
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management Seapine Software
 
Understanding enterprise risk management and fair
Understanding enterprise risk management and fairUnderstanding enterprise risk management and fair
Understanding enterprise risk management and fairiaemedu
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesSlideTeam
 

Similar a ISOL 533 - Information Security and Risk Management R.docx (20)

Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
 
اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk ManagementKuala Lumpur - PMI Global Congress 2009 - Risk Management
Kuala Lumpur - PMI Global Congress 2009 - Risk Management
 
Risks in cc
Risks in ccRisks in cc
Risks in cc
 
Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides Mitigation Planning PowerPoint Presentation Slides
Mitigation Planning PowerPoint Presentation Slides
 
Risk Mitigation Strategies PowerPoint Presentation Slides
Risk Mitigation Strategies PowerPoint Presentation SlidesRisk Mitigation Strategies PowerPoint Presentation Slides
Risk Mitigation Strategies PowerPoint Presentation Slides
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Mitigation Plan PowerPoint Presentation Slides
Mitigation Plan PowerPoint Presentation SlidesMitigation Plan PowerPoint Presentation Slides
Mitigation Plan PowerPoint Presentation Slides
 
Running Head EXECUTIVE SUMMARY6Executive SummaryS.docx
Running Head EXECUTIVE SUMMARY6Executive SummaryS.docxRunning Head EXECUTIVE SUMMARY6Executive SummaryS.docx
Running Head EXECUTIVE SUMMARY6Executive SummaryS.docx
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Mitigation Plan Powerpoint Presentation Slides
Mitigation Plan Powerpoint Presentation SlidesMitigation Plan Powerpoint Presentation Slides
Mitigation Plan Powerpoint Presentation Slides
 
Risk Evaluation And Mitigation Strategies PowerPoint Presentation Slide
Risk Evaluation And Mitigation Strategies PowerPoint Presentation SlideRisk Evaluation And Mitigation Strategies PowerPoint Presentation Slide
Risk Evaluation And Mitigation Strategies PowerPoint Presentation Slide
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
 
2005_SIA_BCP_Conf
2005_SIA_BCP_Conf2005_SIA_BCP_Conf
2005_SIA_BCP_Conf
 
Pragmatic Device Risk Management
Pragmatic Device Risk Management Pragmatic Device Risk Management
Pragmatic Device Risk Management
 
Understanding enterprise risk management and fair
Understanding enterprise risk management and fairUnderstanding enterprise risk management and fair
Understanding enterprise risk management and fair
 
Risk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation SlidesRisk Management Lifecycle Process PowerPoint Presentation Slides
Risk Management Lifecycle Process PowerPoint Presentation Slides
 

Más de christiandean12115

100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docxchristiandean12115
 
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docxchristiandean12115
 
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docxchristiandean12115
 
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docxchristiandean12115
 
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docxchristiandean12115
 
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docxchristiandean12115
 
10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docxchristiandean12115
 
10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docxchristiandean12115
 
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docxchristiandean12115
 
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docxchristiandean12115
 
10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docxchristiandean12115
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docxchristiandean12115
 
10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docxchristiandean12115
 
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docxchristiandean12115
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docxchristiandean12115
 
10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docxchristiandean12115
 
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docxchristiandean12115
 
10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docxchristiandean12115
 
10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docxchristiandean12115
 

Más de christiandean12115 (20)

100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
 
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
 
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
 
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
 
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
 
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
 
10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx
 
10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx
 
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
 
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
 
10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx
 
10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx
 
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
 
10 Most Common Err.docx
10 Most Common Err.docx10 Most Common Err.docx
10 Most Common Err.docx
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx
 
10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx
 
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
 
10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx
 
10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx
 

Último

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Último (20)

Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 

ISOL 533 - Information Security and Risk Management R.docx

  • 1. ISOL 533 - Information Security and Risk Management Risk Management Plan University of the Cumberlands Executive Summary <Review the Scenario on Page #2 of the publisher’s Project: Risk Management Plan. Summarize the information about the company provided in the scenario and place it into this section of the report. Remove these instructions and all other instructions below before submitting the document for grading.> This Risk Management Plan covers the Risks, Threats and Weaknesses of the Health Network, Inc. (Health Network).Risks - Threats – Weaknesses within each domain <Using the Threats listed on Page #3 of the publisher’s Project: Risk Management Plan and the 7 Domains diagram on Page #3 of this template, complete the table on Page #2 of this template (review your Lab #1 solution). Once you enter the Threats into the table, list one or more Weaknesses that might exist in a typical organization using research and your imagination) and then list the Risk to the company if the Threat exploits that Weakness. Then group these Risks-Threats-Weaknesses (R-T- W) by Domain and discuss them below in this section.> User Domain: <list each User Domain R-T--W identified in the table> Workstation Domain: <list each Workstation Domain R-T--W identified in the table> LAN Domain: <list each User Domain R-T--W identified in the table> WAN-to-LAN Domain: <list each Workstation Domain R-T--W identified in the table> WAN Domain: <list each User Domain R-T--W identified in the table> Remote Access Domain: <list each Workstation Domain R-T--W identified in the table>
  • 2. System/Application Domain: <list each User Domain R-T--W identified in the table>Compliance Laws and Regulations <List the laws and regulations that affect this industry.> … Your Organization . ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands Enter details about the organization and it IT Infrastructure. • • • organization
  • 3. division organization's organizational ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands organization . organization organization d organization' ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands
  • 4. organization changes to the systems, applications and organizational data can undermine the organization's violations of federal or state mandates and laws can lead to major . potential to impact the organization organization ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands organization ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands
  • 5. central respoitory accessible via the orporate ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands organization organization ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands ISOL 533 - InfoSecurity & Risk Management University of the Cumberlands RegisterRisk Register#RiskImpact on ProjectCost $LikelihoodImpact Mitigating ActionsContingencyRisk OwnerDeadline101<Identify the risk>Brief description of risk and impact on costs, schedule etc$Very
  • 6. UnlikelyNegligible<Describe what is currently done on the project to reduce the impact of the risk.><Describe the course of action if the risk does materialize: alternate solution, reduction in functionality etc.>Person responsibleMM/DD/YY102<Identify the risk>Brief description of risk and impact on costs, schedule etc$UnlikelyMarginal<Describe what is currently done on the project to reduce the impact of the risk.><Describe the course of action if the risk does materialize: alternate solution, reduction in functionality etc.>Person responsibleMM/DD/YY103<Identify the risk>Brief description of risk and impact on costs, schedule etc$Moderately LikelySignificant<Describe what is currently done on the project to reduce the impact of the risk.><Describe the course of action if the risk does materialize: alternate solution, reduction in functionality etc.>Person responsibleMM/DD/YY104<Identify the risk>Brief description of risk and impact on costs, schedule etc$LikelyCritical<Describe what is currently done on the project to reduce the impact of the risk.><Describe the course of action if the risk does materialize: alternate solution, reduction in functionality etc.>Person responsibleMM/DD/YY105<Identify the risk>Brief description of risk and impact on costs, schedule etc$Very LikelyCrisis<Describe what is currently done on the project to reduce the impact of the risk.><Describe the course of action if the risk does materialize: alternate solution, reduction in functionality etc.>Person responsibleMM/DD/YY106<Identify the risk>Brief description of risk and impact on costs, schedule etc$Very UnlikelyNegligible<Describe what is currently done on the project to reduce the impact of the risk.><Describe the course of action if the risk does materialize: alternate solution, reduction in functionality etc.>Person responsibleMM/DD/YY107<Identify the risk>Brief description of risk and impact on costs, schedule etc$UnlikelyMarginal<Describe what is currently done on the
  • 7. project to reduce the impact of the risk.><Describe the course of action if the risk does materialize: alternate solution, reduction in functionality etc.>Person responsibleMM/DD/YY108<Identify the risk>Brief description of risk and impact on costs, schedule etc$Moderately LikelySignificant<Describe what is currently done on the project to reduce the impact of the risk.><Describe the course of action if the risk does materialize: alternate solution, reduction in functionality etc.>Person responsibleMM/DD/YYBRisk Identifier—a descriptive name or number. Use this for tracking across project documentsCIdentify the risk and relevant triggers that may cause the risk to be realizedDDiscuss the potential impact this risk may have on costs and/or scheduleEIdentify the cost associated with this riskFLikelihood is a measure of the probability of the event occurring: Very Unlikely, Unlikely, Moderately Likely, Likely, Very LikelyGImpact measures the effect on scope, cost, and/or schedule -- Negligible, Marginal, Significant, Critical, or Crisis.HRisk Level is the resultant of Likelihood and Impact Low, Moderate, or High.ISpecify planned mitigation strategies: Preventative (implement immediately) OR Contingency (implement if/when risk occurs)JIdentify who is responsible for undertaking each mitigation action(s)KIdentify the status of the risk: Open, Closed, New etc 1 2 3 4 5 6 A B C D
  • 8. # Risk Impact on Project 101 <Identify the risk> Brief description of risk and impact on costs, schedule etc 102 <Identify the risk> Brief description of risk and impact on costs, schedule etc 103 <Identify the risk> Brief description of risk and impact on costs, schedule etc Risk Register Health Network, Inc. HNetPay Payment Database View Bill – Make Secure Payments View Bill - Make Secure Payments HNetConnect Directory Database Doctors Update Profile Customers Query HNetExchange Message Server (Primary Revenue)
  • 9. Hospitals (Customer) Send Secure Messages Clinics (Customer) Receive Secure Messages View Bill - Make Secure Payments Credit Card Processing Organization Update Profile View Bill - Make Secure Payments Update Profile Corporate Offices Minneapolis Arlington Portland 650 Laptops/Mobile Devices Data Centers *Minneapolis *Arlington *Portland 1000 Servers Loss of company data due to hardware removed from production systems Loss of customers due to production outages Internet threats due to accessibility via internet Loss of company information due to lost/stolen laptops/mobile
  • 10. devices Insider threats Change in regulatory landscape impacting operations Internet Web Server (HNetConnect) Application Server (HNetPay) Database Firewall Email/Message Server (HNetExchange) Credit Card Processing Organization Users Health Network, Inc. Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
  • 11. Company. All rights reserved. www.jblearning.com Page 1 Deliverables As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation. The project is structured as follows: Project Part Deliverable Project Part 1 Task 1: Risk Management Plan Task 2: Risk Assessment Plan Task 3: Risk Mitigation Plan Project Part 2 Task 1: Business Impact Analysis (BIA) Plan Task 2: Business Continuity Plan (BCP) Task 3: Disaster Recovery Plan (DRP) Task 4: Computer Incident Response Team (CIRT) Plan
  • 12. Submission Requirements All project submissions should follow this format: -point, double-space Scenario You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co- location data center, where production systems are located and managed by third-party data center hosting vendors. Company Products Health Network has three main products: HNetExchange, HNetPay, and HNetConnect. HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical
  • 13. messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics. Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 2 HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart. HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all
  • 14. three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites. Information Technology Infrastructure Overview Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees. Threats Identified Upon review of the current risk management plan, the following threats were identified: ata due to hardware being removed from production systems - owned assets, such as mobile devices and laptops various events, such as natural disasters, change management, unstable software, and so on the Internet
  • 15. Management Request Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan. Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase. The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined. Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 3
  • 16. Project Part 1 Task 1: Risk Management Plan For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, use the template provided in class: Evaluation Criteria and Rubrics competencies covered in the course thus far? management plan in the outline? decision-making skills in identifying key components and compliance laws and regulations? id the student create a professional, well-developed draft with proper grammar, spelling, and punctuation? Project Part 1 Task 2: Risk Assessment Plan After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, use the template provided in class: Evaluation Criteria and Rubrics
  • 17. competencies covered in the course relating to risk assessments? plan in the outline? decision-making skills in identifying key components and methodologies? ate a professional, well-developed draft with proper grammar, spelling, and punctuation? Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 4 Project Part 1 Task 3: Risk Mitigation Plan Senior management at Health Network allocated funds to support a risk mitigation plan, and have requested that the risk manager and team create a plan in response to the deliverables produced within the earlier phases of the project. The risk mitigation plan should address the identified threats described
  • 18. in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop this new plan using the template provided in class. Evaluation Criteria and Rubrics -quality risk mitigation plan based on material provided in the course? parts of the project to build out a risk mitigation plan? -developed draft with proper grammar, spelling, and punctuation? Project Part 2 Task 1: Business Impact Analysis (BIA) Plan This part of the project is a continuation of Project Part 1 in which you prepared an RA plan and a risk mitigation plan for Health Network. Senior management at the company has decided to allocate funds for a business impact analysis (BIA). Because of the importance of risk management to the organization, senior management is committed to and supportive of performing a BIA. You have been assigned to develop the BIA plan.
  • 19. Evaluation Criteria and Rubrics instructor regarding feedback on submitted work? identify critical business functions, identify critical resources, identify MAO and impact, and identify recovery objectives? reate a professional, well-developed report with proper grammar, spelling, and punctuation? Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 5 Project Part 2 Task 2: Business Continuity Plan (BCP) After having reviewed and being impressed by your business impact analysis (BIA), senior management at Health Network has decided that your team must also develop a BCP. Management has allocated all funds for a BCP and your
  • 20. team has their full support, as well as permission to contact any of them directly for participation or inclusion in your BCP plan. You have been assigned to develop this new plan. Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private network (VPN) exist between each Production data center and the corporate locations. The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested. You may refer to the following additional resources to help you and your team develop a BCP, and you may use a BCP template if found during your research.
  • 21. References: Questions (Protiviti, 2013), http://www.protiviti.com/en-US/Documents/Resource- Guides/Guide-to-BCM-Third-Edition-Protiviti.pdf http://www.ready.gov/business/implementation/continuity Evaluation Criteria and Rubrics student develop a BCP that could recover business operations while efforts are ongoing to restart pervious operations? during their research? oncepts presented in class? processes? -developed report with proper grammar, spelling, and punctuation?
  • 22. Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 6 Project Part 2 Task 3: Disaster Recovery Plan (DRP) Your project on risk management, the BIA, and the BCP have been well received by senior management at Health Network. They now want you to develop a DRP in order to overcome any mishaps that might occur in the future. You may research and use National Institute of Standards and Technology (NIST) templates to develop a DRP plan for the company. Evaluation Criteria and Rubrics operations while efforts are ongoing to restart pervious operations? research? presented in class? -developed report
  • 23. with proper grammar, spelling, and punctuation? Project Part 2 Task 4: Computer Incident Response Team (CIRT) Plan By now you should have developed an RA, a risk mitigation plan, and a BIA, BCP, and DRP. In this part of the project, you will create a CIRT plan for Health Network. The company headquarters (HQ) handles all incidents because the information security organization is located in Minneapolis, so the plan will have its roots at HQ. Make sure to incorporate your instructor’s feedback on earlier submissions if applicable to the CIRT plan. Evaluation Criteria and Rubrics consider the inputs provided in their earlier submissions? -developed report with proper grammar, spelling, and punctuation?