You will submit the risk assessment portion of the information assurance plan. You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most areas for improvement to current protocols and policies?ÿIn order to effectively respond to applicable threats, information technology administrators must be able to accurately evaluate the threat environment. The ability to engage in this evaluation originates from the performance of a risk assessment. Performing a risk assessment can take on many forms. One recent method of engaging in risk assessment has come in the form of utilizing firewalls and firewall audit tools. Through these measures, IT administrators can map the network and critically analyze where any potential vulnerabilities may lie. The outcomes of these measures results in increased awareness of the most likely types of threats that may materialize, and enables administrators to configure the network in order to mitigate and address these weaknesses and vulnerabilities. Prompt: In Module Five, you will submit the risk assessment portion of the information assurance plan. You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?ÿSpecifically, the following critical elements must be addressed:ÿIII. Risk Assessment a) Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance. b) Evaluate the threat environment of the organization. c) Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?ÿd) Assess the threats to and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers. use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method. Page-length requirements:4?5pages. Make sure you cite if you take a piece of someone?s work, very important and also your reference should relate to your writing (don?t cite a reference because it relates to the course and not this very paper) at least 4 references.www.citationmachine.net to format references into the APA style if necessary. Extremely important.please communicate for any clarifications and please read instructions and follow them. Some tutors don’t pay attention to instructions at all. Very importantI am not doing try and error here so please do not send a hand shake if you have no ideas or experience with research and literature review and protect confidentiality because I will have to provide you with some additional information.

Leave a Reply

Your email address will not be published.