Order for this Paper or Similar Assignment Writing Help

Click to fill the order details form in a few minute.

Posted: August 10th, 2022

Documenting Risk Assessment

In order to complete Assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

Risk assessments are used to determine any change in requirements, technologies, or threats since the last risk assessment was performed. The stages of performing a risk assessment are:

Planning
Information gathering
Risk analysis
Identifying and implementing controls
Monitoring

For this assignment:

Explain the importance of documentation in a risk assessment.
Write a Risk Assessment report that describes what type of information should be documented as applied to WLANs and Internet Protocol (IP) mobility

Documenting Risk Assessment
Risk assessment allows for an organization to calculate its acceptable risks levels in order to institute control measures. Risk assessment is an important part of the provision of security for an organization’s IT assets and it works to provide adequate parameters and minimum security requirements needed to perform a risk assessment (Metivier, 2017). Results of risk assessment are regularly reviewed to create confirmation that all assessments results remain applicable for risk control measures. As such researchers reveal that the processes involved should be reliable and applicable throughout the organizational functions. In most cases, documentation allows for the organization to formulate a standardized approach to reviewing and applying current and future risk assessments perpetually creating reliable security audits for any organization. In writing a risk assessment report that describes the type of information to be documented as applied to WLAN and Internet Protocol (IP) mobility, the risk categories that organizations should consider and include in their risk assessment plan will feature strategic, reputational, operational, transactional and compliance performance and goals of the system (Metivier, 2017). This is because, within any organization’s WLAN and IP mobility the major underlined risks include probability for disclosure, modification, destruction, and denial of service to automated information resources remain to be looming. Giandomenico and Groot (2020) outline that important information to be documented as such include identified system vulnerabilities, audit comments, previous risk assessments compared to current, mission criticality, information sensitivity levels, audit advisories, inherent risks, personnel with access or authorized entries to system. This might be caused by human threats and failures or environmental threats. Environmentally, natural disasters such as extreme weather events and earthquakes or tsunamis risk damages (Metivier, 2017). Categorically, human threats are agent threats, for example, third-party contractors, former disgruntled employees, unauthorized users accessing the database, or lack of training for an approved user who has authority (Giandomenico and Groot, 2020). They provide a holistic understanding of threats and allow a better policy formulation that is based on the risk assessment performed.

References
Giandomenico, N & Groot (2020). Insider vs. Outsider Data Security Threats: What’s the Greater
Risk? from https://digitalguardian.com/blog/insider-outsider-data-security-threats
Metivier, B. (2017a, May 04). How to Define Cybersecurity Risk [Blog]. Retrieved from Tyler
Cybersecurity / Sage Advice – Cybersecurity Blog: https://www.tylercybersecurity.com/blog/how-to-define-cybersecurity-risk

Check Price Discount

Study Notes & Homework Samples: »

Why Choose our Custom Writing Services

We prioritize delivering top quality work sought by students.

Top Tutors

The team is composed solely of exceptionally skilled graduate writers, each possessing specialized knowledge in specific subject areas and extensive expertise in academic writing.

Discounted Pricing

Our writing services uphold the utmost quality standards while remaining budget-friendly for students. Our pricing is not only equitable but also competitive in comparison to other writing services available.

0% similarity Index

Guaranteed Plagiarism-Free Content: We assure you that every product you receive is entirely free from plagiarism. Prior to delivery, we meticulously scan each final draft to ensure its originality and authenticity for our valued customers.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00