HBS 580
Subject Code: BIT361
Subject Name: Security Management and Governance
Assignment Part B
Final Risk Assessment/Management Document
Prepared for the Management of Denisovan
Prepared By:
Student No.
Word Count : 300
Executive Summary
Not Required for this assignment
TABLE OF CONTENTS
Internal Heading 5
Document Content 5
Introduction 5
A discussion of why policies are needed (5) 5
A discussion of what policy documents should look like. (5) 5
A discussion of the types of policies needed for information security. (10) 5
Benefits and purpose of a risk assessment plan. (5) 5
Description of risk assessment process (10) 5
Outline the steps for creating a risk management plan (10) 5
Perform a simple risk assessment 5
Identification of Assets (5) 5
Asset priority determined using Table 1. (5) 5
Identification of threats/vulnerabilities using TVA table. (10) 5
Priorities set (Table XXXXXXXXXX) 6
Suggested controls (5) 6
Conclusion 7
References 8
Appendix 9
Announcment of Originality.
The Author of this work, whos name appears on the title page attest to the originality of all work contained, whereas any sources or references have been used they will appear under the references section
Internal Heading
Document Content
Introduction
A discussion of why policies are needed (5)
A discussion of what policy documents should look like. (5)
A discussion of the types of policies needed for information security. (10)
Benefits and purpose of a risk assessment plan. (5)
Description of risk assessment process (10)
Outline the steps for creating a risk management plan (10)
Perform a simple risk assessment
Identification of Assets (5)
Asset priority determined using Table 1. (5)
Table 1: Asset priority table
Revenue impact
Profitability Impact
Public image
Priority Score
(Asset impact)
XXXXXXXXXXCriterion Weight -
Assets Ë…
Identification of threats/vulnerabilities using TVA table. (10)
Table 2: TVA Table
XXXXXXXXXXAssets
Threats
Priorities set (Table XXXXXXXXXX)
Table 3: Risk.
Asset
Threat
Vulnerability
Likely hood
Impact
Priority
Suggested controls (5)
Conclusion
Gracefully exit your essay by making a quick wrap-up sentence, and then end on some memorable thought, perhaps a quotation, or an interesting twist of logic, or some call to action. Is there something you want the reader to walk away and do? Let him or her know exactly what. http:
www1.aucegypt.edu/academic/writers
References
Note – this is an example reference only – do not include
Ireland, R. D., Hitt, M. A. & Hoskisson, R. E XXXXXXXXXXUnderstanding business strategy : concepts and cases, Thomson South-Western.
Subject Code – Subject Name
Individual Assignment No. XX
Page 8 of 8
Appendix
The material in this document is subject to alteration or amendment without notice by Swinburne.