Appraise Risk Analysis, Frameworks, and Models
Select a financial institution, high-tech manufacturer, or a hospital that has no fewer than 500 employees and provide guidance regarding the risks faced by the organization. Consider the organization that you select and name, as well as the industry in your response. Your guidance is directed to the Chief Information Officer (CIO) as a result of the concern during a period where the Chief Security Officer (CSO) is not available. You need to fill in for the CIO.
Review key external influences on risk and then outline the most important influences from within the organization. Start by selecting any appropriate laws, standards, frameworks, and theories that should underscore your guidance. Use the foundation to establish a strong framework allowing you to provide a convincing and logical response, leading to the acceptance of your guidance. Your response should be persuasive and supported by both scholarly sources and especially any relevant legislation, standards, frameworks, and theories. Despite the formal foundation, including a strong focus on practical issues and values that can be used to motivate resources for the proposed mitigation later in the course. Note that the focus this week is on risk and guidance.
References: Support your assignment with no fewer than 12 scholarly sources published within the last five years from peer-reviewed academic journals and Internet sources.
Length: 7 pages not to include the cover page and reference
Your assignment should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect graduate-level writing and APA standards. Be sure to adhere to the university’s Academic Integrity Policy.
by Lawrence Baiden
Submission date: 06-Dec-2020 07:02PM (UTC-0600)
Submission ID: 1466749869
File name: Appraise_Risk_Analysis x (30.15K)
Word count: 2428
Character count: 14115
43%
SIMILARITY INDEX
35%
INTERNET SOURCES
12%
PUBLICATIONS
36%
STUDENT PAPERS
1 6%
2 6%
3 3%
4 2%
5 2%
6 2%
7 1%
8 1%
9
Appraise Risk Analysis x
ORIGINALITY REPORT
PRIMARY SOURCES
www.uscybersecurity.net
Internet Source
Submitted to Northcentral
Student Paper
healthitsecurity.com
Internet Source
www.healthevidence.org
Internet Source
www.hipaajournal.com
Internet Source
Submitted to University of Maryland, University
College
Student Paper
Submitted to Jacksonville State University
Student Paper
Submitted to Sheffield Hallam University
Student Paper
www.fairwarning.com
1%
10 1%
11 1%
12 1%
13 1%
14 1%
15 1%
16 1%
17 1%
Internet Source
en.wikipedia.org
Internet Source
Karen M. Hogan. “A global comparison of
corporate value adjustments to news of cyber-
attacks”, Journal of Governance and Regulation,
2020
Publication
link.springer.com
Internet Source
Submitted to Regis University
Student Paper
Submitted to ECPI College of Technology
Student Paper
iacis.org
Internet Source
Submitted to Macquarie University
Student Paper
Foroozan Ghosairi Darbandeh, Masoumeh
Safkhani. “A New Lightweight User
Authentication and Key Agreement Scheme for
WSN”, Wireless Personal Communications,
2020
Publication
18 1%
19 1%
20 1%
21 1%
22 1%
23 1%
24 1%
25 1%
Submitted to colorado-technical-university
Student Paper
Danisa Nkomo, Raymond Brown. “Chapter 9
Hybrid Cyber Security Framework for the
Internet of Medical Things”, Springer Science
and Business Media LLC, 2019
Publication
Submitted to Curtin University of Technology
Student Paper
Submitted to Western Dakota Tech
Student Paper
Submitted to Campbellsville University
Student Paper
Brooke Luo, Mark Mai, Amit Shah, Daniel
Herchline, Christina Rojas, Jessica Hart, Sanjiv
Mehta. “102. HACKING OUR WAY TO
IMPROVEMENT: LEVERAGING THE
HEALTHCARE HACKATHON TO ENGAGE
HOUSESTAFF IN QI”, Academic Pediatrics,
2020
Publication
Submitted to The University of Manchester
Student Paper
Submitted to Herzing University
Student Paper
26 1%
27 <1% 28 <1% 29 <1% 30 <1% 31 <1% 32 <1%
Exclude quotes Off
Exclude bibliography Off
Exclude matches Off
Submitted to Nanyang Technological University,
Singapore
Student Paper
Submitted to De Montfort University
Student Paper
Submitted to Gusto International College
Student Paper
va.gov
Internet Source
www.calyptix.com
Internet Source
meridian.allenpress.com
Internet Source
“The Ethics of Cybersecurity”, Springer Science
and Business Media LLC, 2020
Publication
- Appraise Risk Analysis x
by Lawrence Baiden
Appraise Risk Analysis x
ORIGINALITY REPORT
PRIMARY SOURCES