The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 4 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Let’s do some risk analysis on a school's information assets. The school stores many
types of about students and three of these are: identification information (name, address,
SIN, telephone numbers etc.), IT information (username, password, email services, etc.),
and financial information (tuition, student loans, banking information, etc.)
Â
a. For EACH of the three types of information describe who would want
to illegally access this type of information and why?
Â
b. Consider what the impact would be for EACH of the three types of
information mentioned above if the information was improperly accessed or
damaged. Is the impact Catastrophic (expose school to serious lawsuits, loss of
reputation, and/or information cannot be recreated), Serious (some exposure to
lawsuits, loss of reputation and/or information is expensive to recreate), or No Big
Deal (small chance of lawsuits, information can easily be recreated). Be sure to
justify your choice for each type of information.
Â
c. Now consider what the likelihood is that EACH type of information
could be accessed or damaged: not likely, moderately likely, very likely. Justify
why you think the information fits in that category.
Â
d. Now let’s look at how we can manage the risk. Basic techniques are:
avoiding the risk, modifying the risk (impact and/or likelihood), transferring the
risk to others, and accepting the risk. What techniques would you use for EACH
of the types of information and how would you implement it?
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll -----------be -----------qui-----------ckl-----------y