Case Study – Information Security Risk Assessment 1

    Case study and instructions are attached in pdf and requirements are below – thank you.
    This will be checked against a popular plagiarism checker so please be mindful.
    REQUIREMENTS:
    Our 15 – 25 page Risk Assessment Paper is due on XX. This is a formal research paper that should contain a title page table of contents running header page count executive summary and a significant scholarly reference list (at least 5 – 10 sources). Your paper should be formatted using APA styling. A few well placed tables or charts are fine (provided they are in APA format). However do not over use tables charts or graphs to increase page count. This will lower the quality of your paper. Also ensure your fonts margins and spacing are APA standard.
    As you are building the outlines for your papers be sure to align them with the rubric. I will use the rubric to grade your work and assign points. If your paper is in line with the rubric (i.e. align the rubric with your table of contents) it will be well organized and ensure you get all the points you deserve. I am hopeful that I will be reading a lot of A papers. Proof read use correct grammar and stick to covering the rubric and you will do great.
    Lastly remember to use Turnitin for this assignment. If there are any issues with using Turnitin you should connect with me ASAP so we can figure it out. If no prior arrangement has been made I will expect each paper to be submitted to Turnitin.
    Rubric Name: Risk Assessment Paper
    Inventoried prioritized assets and addressed mission objectives in their asset priority.
    Inventoried prioritized assets but did not address mission objectives in their asset priority.
    Inventoried assets but did not prioritize them in the order of mission criticality.
    Did not inventory or prioritize assets in the order of mission criticality.
    Evaluated enterprise topology perimeter protection measures and addressed mission objectives.
    Evaluated enterprise topology perimeter protection measures but did not address mission objectives.
    Evaluated enterprise topology but did not include perimeter protection measures.
    Did not evaluate enterprise topology and perimeter protection.
    Evaluated remote access protocols security safeguards to the network and addressed mission objectives.
    Evaluated remote access protocols security safeguards to the network but did not address mission objectives.
    Evaluated remote access protocols but did not address security safeguards to the network.
    Did not evaluate remote access protocols and safeguards to the network.
    Evaluated authentication protocols methodologies with supporting data description; and addressed mission objectives.
    Evaluated authentication protocols methodologies with supporting data and description but lacks mission objectives.
    Evaluated authentication protocols methodologies but with insufficient data or inadequate description.
    Did not evaluate authentication protocols and methodologies.
    Evaluated web access protocols vulnerabilities and addressed mission objectives.
    Evaluated web access protocols vulnerabilities but did not address mission objectives.
    Evaluated web access protocols but did not address vulnerabilities.
    Did not evaluate web access protocols and vulnerabilities.
    Assigned asset values to organization assets in a complete inventory and addressed mission objectives.
    Assigned asset values to organization assets in a complete inventory but did not address mission objectives.
    Assigned asset values to organization assets for quantitative risk assessment but incomplete.
    Did not assign asset values to organization assets for quantitative risk assessment.
    Assessed vulnerabilities on each asset of complete inventory and addressed mission objectives.
    Assessed vulnerabilities on each asset of complete inventory but did not address mission objectives.
    Assessed vulnerabilities on each asset but incomplete.
    Did not assess vulnerabilities on each asset.
    Recommended risk mitigation procedures commensurate with asset values of complete inventory and addressed mission objectives.
    Recommended risk mitigation procedures commensurate with asset values of complete inventory but did not address mission objectives.
    Recommended risk mitigation procedures commensurate with asset values but incomplete.
    Did not recommended risk mitigation procedures commensurate with asset values.
    Followed proper quantitative risk assessment format and conformed to APA in a sufficient reference list and page count.
    Followed proper quantitative risk assessment format and conformed to APA but insufficient reference list and page count.
    Followed proper quantitative risk assessment format but did not conform to APA format.
    Did not follow proper quantitative risk assessment format and failed to conform to APA format.
    Included an executive summary in details and
    addressed mission objectives.
    Included an executive summary in details but did not address the mission objectives.
    Included an executive summary but lacks details.
    Did not include an executive summary.

                                                                                                                                      Order Now