DeVry SEC 578 Week 6 Course Project Latest
Week 6 course project
Write a Risk Assessment Report that is 5–10 pages long and contains a required risk management matrix.
Present a senior management-level PowerPoint briefing consisting of no more than 10 slides.
Papers must be 5–10 pages long (this would be roughly one page per area included in the report) with 10-point font.They must be double-spaced must include a cover page, table of contents, introduction, body of the report, summary or conclusion, and works cited.
Even though this is not a scientific-type writing assignment, and is mostly creative in nature, references are still very important. At least six authoritative outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page, which is titled “Works Cited.”
Appropriate citations are required.
All DeVry University policies are in effect, including the plagiarism policy.
Management Briefing (PowerPoint) is due at the end of Week 6 (resubmit to the Project Discussion topic in the Week 7 Discussion forum) of the course.
Risk Assessment Report and Risk Management Matrix are due during Week 6 of this course.
Any questions about the Course Project may be discussed in the weekly Q & A Discussion topic.
The paper and PowerPoint are worth 190 total points and will be graded on quality of research topic, quality of paper information, use of citations, and grammar and sentence structure.
Read the first week’s Course Project files in the CSPM Project Files and Hacker Project Files in Doc Sharing. To obtain the role information for either the CSMP or the hacker, go to the Doc Sharing dropdown menu. There you will see a box next to the “Select View.” Click on the arrow to view the choices. Then click on the “GO” button.
The case study will explore an information system and the organization in which it operates, and the current state of the information system. You will choose a scenario from either the perspective of a Computer Security Program Manager (CSPM) or from a hacker’s perspective.
Next, place your decision in a Word document and submit it to the Week 1 Course Project Planning Assignment Dropbox. If there are insufficient CSPM choices or hacker choices, the teacher may (randomly) ask a student to change the choice.
Note: Once the choice is made, it is final. Sharing the CSPM and Hacker packets is not allowed.
Each teacher will send an additional handout to each student and provide extra information pertinent to the case. Each member will be provided identical information as its other group members (either the CSPM or hacker group). The CSPM packet and the Hacker packet present different information. The idea is to get two views of the risk for comparison: one from the point of view of the CSPM, and one from the point of view of a hacker.
Differing and contrasted perspectives offer a lens through which to view the problem of physical and operational security: from the lens of a responsible manager or from the lens of a hacker. The differing perspectives are useful in exploring the fundamental problems associated with securing an information system, and will have the student considering problems from both perspectives. In the industry, we even see the availability of “hacker certification” where technology professionals are trained to think like hackers in order to gain meaningful perspectives. As mentioned in the Week 1 Lecture, the advice to know the enemy and to think as the enemy is thousands of years old (Sun Tzu) but is as valid today as it was in 500 B.C.
The PowerPoint will be a briefing to senior management that could be used to present the findings of the risk assessment to management. The briefing will identify the system that was assessed, provide a brief description of the assessment process used, state the conclusions of the assessment, and recommend a course of action to management.
At the end of Week 6, the senior management-level briefing will be posted to the Project Discussion topic in the Week 7 Discussion forum and discussed among class members during that week. Differences in approach and findings will be identified and the ramifications of those differences will be discussed. Discussion, however, is not limited to these two topics but is expected to be “freewheeling” (where anything is fair game, but please use discretion).
Risk Assessment Report
The risk assessment report will contain a simple risk management matrix that can be easily read and understood by senior management so that management can make an appropriate risk management decision.
Risk Management Matrix
The risk management matrix will be a matrix with at least the following columns.
What adversary might exploit this risk
Estimated likelihood of exploitation
Impact if the risk is exploited
Recommended course of action
At least three risks must be identified. Students are at liberty to add columns and rows to the risk management matrix if deemed necessary. Keep in mind this matrix is for senior management’s use.
The following table is a sample to use.
Brief Description of Risk Adversary (Who Might Exploit this Risk) Likelihood Impact Course of Action
Submit the Risk Assessment Report, Risk Management Matrix, and Management Briefing to the Week 6 Course Project Dropbox.
Note: the Management Briefing receives two grades: one for its submission to the Project Discussion topic in the Week 7 Discussion forum and the other for its submission to its Week 6 Course Project Dropbox.
See the Syllabus section “Due Dates for Assignments & Exams” for due date information.
DeVry Courses helps in providing the best essay writing service. If you need 100% original papers for DeVry SEC 578 Week 6 Course Project Latest, then contact us through call or live chat.
DeVry SEC 578 Week 6 Course Project Latest
There are no reviews yet.