Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the
risk manager and team create a plan in response to the deliverables produced within earlier phases of the project.
The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any
new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of
this new plan.
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: APA style guide
Estimated length: 10–12 pages
Self-Assessment Checklist
I created a basic risk mitigation plan that addresses the identified threats in the project scenario, as well as any
new threats that may have been discovered during the risk assessment.
I created a professional, well-developed draft report with proper documentation, grammar, spelling, and
punctuation.
I included citations for all sources used in the report.
I followed the submission guidelines
Category: Computer Science
Assignment Content Question The director of IT has indicated that the board of
Assignment Content
Question
The director of IT has indicated that the board of directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.
Using the links provided, research at least 2 of the following codes of ethics:
(ISC)2 Code of Ethics
The International Council of Electronic Commerce Consultant (EC-Council)
System Administration, Networking, and Security Institute (SANS)
Global Information Assurance Certification (GIAC)
SANS IT
Institute of Electrical and Electronics Engineers (IEEE)
Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:
Reflect on ethical considerations for each type of data involved (e.g., active directory user information, reporting information, logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.
After learning the more advanced features of Excel in Unit V, what is your favor
After learning the more advanced features of Excel in Unit V, what is your favorite graphics or tables feature, and how will you utilize this feature in the future? Explain how this new feature might aid in your success. If no initial posts exist to allow for a response to be made, you may submit an additional initial post addressing another aspect of the unit topic.
post at least two follow-up responses to your classmates. My post Linux in Actio
post at least two follow-up responses to your classmates.
My post
Linux in Action
After revisiting this Linux case study’s “Results” section, I was at a loss for words regarding its widespread success and how it can adapt to multiple industries. Linux operating system, which was first a hobbyist interest of Linus Torvalds, has grown to become the most dominant operating system in the world. What surprised me most was how it invaded sectors like financial markets, cloud computing, and even supercomputing fields, which proprietary systems dominated until recently.
The case study also noted Success areas of Linux, such as the New York Stock Exchange or global carrier data centres. For example, the New York Stock Exchange operates more than 250,000 orders per second, with speed and efficiency incomparable to Linux. Such scalability customization- particularly in the financial segment- presents a massive shift from proprietary systems to open-sourced technology. Also, knowing that 99.6% of the world’s supercomputers now run Linux showed impressive flexibility and reliability (The Linux Foundation, 2020).
This review positively influenced my opinion of Linux, from the impression I had about it relating most with web hosting and open-source enthusiasts to the critical sectors it is used in, such as telecommunication and cloud computing, and even finding its way into embedded systems. This goes to show great adaptability. What was initially an academic project has finally matured into an industrially leading solution. While the case study described the collaborative spirit that drove the success of Linux as a form of open-source innovation, it mainly attested to Linux’s status not only as a technological marvel but also as one founded upon effective collective effort (The Linux Foundation, 2020). The study deepened my appreciation for Linux and its role in modern computing.
References
The Linux Foundation. (2020, April 21). Linux Case Study – The Linux Foundation. Web.archive.org. https://web.archive.org/web/20200421021348/https://www.linuxfoundation.org/projects/case-studies/linux/
Classmate 1 Jason who needs a response
Learning about Linux, especially from this study, has really opened my eyes to its power. It’s amazing how Linux isn’t just a historical thing but is super important today in many industries.
I was shocked to learn how much Linux is used in financial markets. I knew it was popular because it’s open-source and flexible. But I didn’t realize how crucial it is for high-speed trading. The fact that the New York Stock Exchange handles so many quotes and orders every second on Linux blew my mind. It shows Linux’s speed and efficiency, and how it can meet tough financial demands. It’s not just a small player; it’s a big deal where milliseconds matter.
The study also taught me a lot about Linux in cloud computing. Over 75% of cloud-based companies use Linux. This shows it’s not just relevant but essential for IT today. Companies are moving to open-source solutions for scalability and cost-effectiveness. This trust in Linux proves it’s a strong choice for handling complex IT tasks.
Linux’s role in supercomputing also caught my eye. Almost all of the top 500 powerful computers use Linux. This shows it’s great for big tasks in science and tech, where performance matters. Knowing Linux is behind major research and tech advancements shows its importance.
The part about embedded systems and IoT was really interesting too. Linux has become a standard for these systems, showing its flexibility. It now supports many applications, from industrial controls to medical devices. This makes me respect Linux more and excited about its future uses as the world connects more.
Overall, this study changed my view of Linux for the better. I used to see it as just an alternative to Windows or macOS, mainly for tech enthusiasts. But now I see it’s a key part of modern tech across many fields.
The open-source model of Linux is really appealing today. Developers worldwide can work together on it, which is revolutionary. This teamwork promotes innovation and quickly fixes security issues, which is shown in Linux’s strong security record.
In conclusion, learning about Linux through this study made me appreciate its role in tech more. It’s not just an operating system but a vital ecosystem supporting many applications and industries. Its growth and open-source philosophy suggest it will keep shaping computing’s future. As tech evolves, I’m excited to see how Linux will continue to revolutionize industries.
Classmate 2 who needs a response Komla
The “Results” section about Linux case study was good and the study showed how Linux helps companies save money while still being fast and secure. I was surprised to see that many big companies, including famous tech ones, use Linux for their servers. This shows that Linux is reliable and works well.
My view of Linux has changed a lot. At first, I thought it was only for tech experts, but the case study showed how useful it can be in everyday situations. I now think it’s a great choice for businesses that want to cut costs without losing quality.
The study also pointed out how strong the community support for Linux is. This means users can find help easily, making Linux more user-friendly. Because of this, I feel more excited to try out Linux for my own projects and school work.
In conclusion, the Linux case study taught me a lot about its advantages and changed how I see open-source software. I now see how useful it can be in different industries and can’t wait to learn more about how it’s used.
– I will upload a research paper and it needs to be formatted according to the j
– I will upload a research paper and it needs to be formatted according to the journal template I will provide.
Chapter 22: Discuss how you might address risk analysis in the text box (Lack of
Chapter 22: Discuss how you might address risk analysis in the text box (Lack of Planning… ) on page 388. Give examples for solutions that you would’ve implemented. How would risk play into the design strategy for data, sites, etc?
Throughout this project, the necessary information has been assembled to provide
Throughout this project, the necessary information has been assembled to provide your boss Maria with a risk assessment so that she may begin developing a long-term risk management strategy. This final step is compiling that information into a cogent “summary report” for presentation to company executives. This report will summarize the Vulnerability and Threat Assessment with the addition of the Risk Assessment just completed.
It is critical to provide recommendations to help the organization implement effective information risk management practices. Use findings in the previous steps to recommend risk management strategies such as least privilege, separation of duties, mandatory vacation, risk management technologies, and others you have found appropriate.
Remember, the recommendations included in the report should address all aspects of the research—business, economic, and technical reasoning for the conclusions.
Follow these Final Risk Assessment Summary Report requirements while writing the final risk assessment summary.
In this step, you will prioritize your selected risk responses from the last ste
In this step, you will prioritize your selected risk responses from the last step based on several factors:
The economic impact to the organization should the assessed risk occur.
The likelihood (probability) of an event that would activate the risk.
The arrangement of assets ranked by priority based on the highest value of the following formula: (economic impact) X (probability) = risk
Risk Formula – Economic Impact times Probability equals Risk
Use the Prioritized Risks and Response Matrix template to submit your findings for feedback.
You identified the potential financial impacts should identified threats become
You identified the potential financial impacts should identified threats become realities in the last step. Here, use your findings to complete the Business Impacts and Probabilities Matrix, listing each identified threat and the risk, the probability, and a potential mitigation to include all policies, processes, and technologies to be used in formulation of financially and logistically sound mitigation strategy.
After you’ve completed this step, you will document and prioritize risk responses.
You’ve reviewed the list of vulnerable assets, and in this step, you will docume
You’ve reviewed the list of vulnerable assets, and in this step, you will document threats. Recall that a threat is any event, action, or factor that has the potential to cause damage to the enterprise. Threats can come from a variety of sources, including people (a hacker stealing employee passwords) and natural events (a power blackout causing data loss).
Use the Internal and External Threats Template to add all threats and vulnerabilities—internal and external to the enterprise—and tie them to the itemized assets that will be affected. Note that external threats will include a comprehensive review by device type at network access, both direct and indirect, a view of the social media landscape as a threat.