Question

Scenario 2: Richman Investments is concerned about the security of its customer data. Management has determined that the thre

Present the data graphically to senior management in the form of a risk matrix. A sample risk matrix is shown below: High ImpHelp complete the matrix.

Scenario 2: Richman Investments is concerned about the security of its customer data. Management has determined that the three primary risks the company faces in protecting the data are as follows Unauthorized access by an external party . Sabotage by an internal employee Hardware failures Richman has created scales for the probability and impact of risks as follows Probability: Low-10%, Medium-50%, and High-100% . Impact: Low- 10, Medium 50, and High 100 After surveying key individuals in the company, Richman calculated the probability and impact of each risk, as shown in the table below. Based on the information given above, calculate the risk level for each risk Category Unauthorized access by an external party Sabotage by an internal employee Hardware failures Probability 25 75 30 Impact 50 100 25 Risk Level 13% 79% 8% Which risk has the highest risk level? Sabotage by an internal employee Prioritize the risks from high to low Priority 1 Sabotage by an internal employee Priority Unauthorized access by an external party Priority 3 Hardware Failures
Present the data graphically to senior management in the form of a risk matrix. A sample risk matrix is shown below: High Impact Value -100 Low Probability High Impact High Probability High Impact 100 45 DoS Attack Web 27 Loss of Data due to Hardware Falure High Probability Value -100 Loss of Data due to Unauthorized Access Low Probability Low Impact High Probability Low Impact Low Impact Value Complete the following risk matrix based on your data:
0 0
Add a comment Improve this question Transcribed image text
Answer #1

0 probability Rak ue ane So S13 ab 7s 1o0 30 2S- loo Risk love& ユー 구s isk le

Add a comment
Know the answer?
Add Answer to:
Scenario 2: Richman Investments is concerned about the security of its customer data. Management ...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Identify research specifically for risk assessment, risk management and business continuity steps that support data security...

    Identify research specifically for risk assessment, risk management and business continuity steps that support data security and confidentiality during a disaster. Identify resources to assist in developing a disaster recovery plan. Create a business continuity plan considering the following possible disasters as a basis for discussion: natural disasters; terrorist attacks; infrastructure failures; staff disruption due to illness or work stoppages, which are especially concerning to small and medium-sized businesses with small work forces and specialized workers; unintentional or malicious data...

  • Scenario Background Company: Pepsi Pepsi’s Product Portfolio Fun for you Better for you Good for you...

    Scenario Background Company: Pepsi Pepsi’s Product Portfolio Fun for you Better for you Good for you Pepsi’s Target Markets Millennial Generation X Baby Boomer Internal Environment Board of Directors Risk management director at board level Multiple levels of corporate management Chief risk officer at corporate management level Multiple divisions Multiple management levels within divisions Executive risk manager at divisional level Wholly owned subsidiaries Multiple divisions within subsidiaries Multiple management levels within divisions External Environment Bottling companies Distributers Point of sale...

  • Threat modelling report in response to a case scenario by identifying the threat types and key...

    Threat modelling report in response to a case scenario by identifying the threat types and key factors involved.write a report to identify the threat types and key factors involved. In doing so, required to identify the most ‘at-risk’ components, create awareness among the staff of such high-risk components and how to manage them. In addition, this report is to help key stakeholders, including the executive managers, to make decisions on what course of actions must be undertaken to mitigate potential...

  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • Dear Sir/Madam, could you answer all the question below. I appreciate if u can answer all....

    Dear Sir/Madam, could you answer all the question below. I appreciate if u can answer all. Thank You :) A (Bad?) Day in the Life of a Project Manager Frank Mills is a Site Agent for McMurray Concrete Ltd which specialises in building concrete structures on industrial sites. His present site is a large chemical plant, Agrochem Ltd that manufactures farm fertilisers. The project he is currently working on is part of a large contract being managed by Design Solutions...

  • Case Study 3: Driving Ari Fleet Management with Real-Time Analytics Automotive Resources International®, better known as...

    Case Study 3: Driving Ari Fleet Management with Real-Time Analytics Automotive Resources International®, better known as simply ARI®, is the world's largest privately-held company for vehicle fleet management services. ARI is headquartered in Mt. Laurel, New Jersey and has 2,500 employees and offices throughout North America, Europe, the UK, and Hong Kong. The company manages more than 1,000,000 vehicles in the U.S., Canada, Mexico, Puerto Rico and Europe. Businesses that need vehicles for shipments (trucks, vans, cars, ships, and rail...

  • Discussion questions 1. What is the link between internal marketing and service quality in the ai...

    Discussion questions 1. What is the link between internal marketing and service quality in the airline industry? 2. What internal marketing programmes could British Airways put into place to avoid further internal unrest? What potential is there to extend auch programmes to external partners? 3. What challenges may BA face in implementing an internal marketing programme to deliver value to its customers? (1981)ǐn the context ofbank marketing ths theme has bon pururd by other, nashri oriented towards the identification of...

  • OPS Practice quiz 2. The benefits of risk pooling depend on the behavior of demand from...

    OPS Practice quiz 2. The benefits of risk pooling depend on the behavior of demand from one market relative to demand from another. True False 3. What is Supply Chain Management? A set of approaches utilized to efficiently integrate suppliers, manufacturers, warehouses and stores so that merchandize is produced, distributed at the right quantities, to the right locations and at the right time in order to minimize system wide costs while satisfying service level requirements. The management of the flow...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Case One: Railroads Struggle to Implement Positive Train Control Positive train control (PTC) is a complex...

    Case One: Railroads Struggle to Implement Positive Train Control Positive train control (PTC) is a complex system designed to prevent the human errors that cause roughly 40 percent of train accidents, including train-to-train collisions, derailments caused by excess speed, train movement through track switches left in the wrong position, and unauthorized incursion into work zones. PTC uses wireless communications to relay visual and audible data to train crew members regarding when the train needs to be slowed or stopped. This...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT