Course Hero Logo

W006_S2_2020 (2020_11_17 14_25_03 UTC).pdf - 9/7/20...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 7 pages.

9/7/201SCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNINF30020 ISRSInformation Systems Risk & SecurityWorkshop 6, 2020Risk assessment and the TSF Case:Qualitative Risk AssessmentSCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNSCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNWorkshop 61.INF30020 announcements and reminders2.Group assignment available end of this week3.This week’s workshop is designed to continue your focus onqualitative risk assessment commenced and individual assignmentwork.4.In the activity you will continue to work with yourassignment casestudy to consider, apply and evaluateThe connection between theory and practice in risk assessmentBest approaches to the description of likelihood and impactBased on a consideration of Cloud AND Mobile risks in theTSF case2Qualitative Risk assessment & the TSF Case
9/7/202SCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNSCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNReadings in support ofQualitative Risk AssessmentUnit texts:1.Gibson, Darril, Chapter 5 Defining Risk Assessment Approaches.ManagingRisk in Information Systems. 2015.2.Whitman, Michael E. annd Mattord, Herbert J.Chapter 6 Risk Management,Risk Assessment.Management of information security. Sixth Edition.,Stamford, Conn. : Cengage Learning, 2019.Suggestionsfrom additional reading list1.Schmittling, R. & Munns, A.Performing a Security Risk Assessment, ISACAJournal, 2010,Volume 1,-1/Pages/Performing-a-Security-Risk-Assessment1.aspx2.Thomas R. Peltier (2004) Risk Analysis and Risk Management, InformationSystems Security, 13:4, 44-56,Swinburne Library link:px?direct=true&db=a9h&AN=14451647&site=ehost-live&scope=site (Linksto an external site.)Links to an external site.SCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNSCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNSCIENCE|TECHNOLOGY|INNOVATION|BUSINESS|DESIGNCase Report Part A: is all about identifying & assessingTake a step wise approach & use these steps to model your assignment:You are an external auditor hired by VGB to complete and report on an overallsecurity risk assessment for the organisation:üPropose a target risk appetite and risk tolerance level for the TSF (week 3),üIdentify the key roles and responsibilities of individuals and departments withinthe organization as they pertain to risk assessment (week 4),üCarefully audit the case evidence, undertake an inventory and identify

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 7 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
One
Professor
N/A
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture