ITC596 IT Risk Management Assignment Help

ITC596 IT Risk Management Assignment Help

ITC596 IT Risk Management Assignment Help

This assessment provides students with a thorough background in IT security risk management issues. A student must obtain at least 50% of the total marks to pass this subject. Complete selections of risk management techniques for IT security are covered, containing quantitative and qualitative methods. Other topic includes security decision making, risk transference, risk mitigation and business continuity planning.

Learning outcomes

On successful completion of this subject:

1. You should be able to justify the goals and various key terms used in risk management and assess IT risk in business terms:

2. You should be able to apply both qualitative and quantitative risk management approaches and to compare and contrast the advantages of each approach

3. You should be able to critically analyze the several approaches for mitigating security risk, containing when to use insurance to transfer IT risk;

4.  you should be able to analytically assess IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to decrease risk.

This assessment has three tasks:

Task 1

The value of this assessment task is 10%. The alternative is the submission method for this task.

How to successfully approach this task:

1. You will be provided with specific issues that you need to address in the forum discussions. These will be located in the first two (2) topics in the interacting site.

2. Reflect on these questions and post your written responses on the forum and engage with your peers and their responses.

3. As this is a postgraduate course, it is expected that your written responses will provide you with an opportunity to express your personal and professional views. There are no correct answers, however, the way you justify your answers with validated evidence is key to this activity.

4. It is recommended that you post your responses as you get to the forum prompts in the topics in interact.

5. To successfully complete this task, you are required to curate, collect and save your responses in a word document to be submitted on Turnitin. Include the date and time this was posted on the forum. This activity's final mark will be provided prior to the final assessment item.

6. It is key that you respond and posts regularly and not post everything in the week that this assessment item is due.

This assessment task will assess the following learning outcome/s:

1. Be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.

2. Be able to critically analyze the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.

3. Be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

ITC596 IT Risk Management, IT Risk Management Assignment Help, ITC596

Task 2

The value of this task is 20%. The submission of this task is an alternative method.

This task has 2 parts:

Part 1

Online Quiz

The online quiz must be attempted by the students individually. The quiz is worth 5 marks of the overall marks available for task 2.

You will have an hour (1 hour) to complete the quiz which consists of 30 multiple choice questions. Once you start your quiz, you must complete it in one sitting. You only have one attempt at the quiz. The topics of the online quizzes are:

a. Information Security Fundamental
b. Information Security Planning
c. Information Security Policy and Program
d. Information Security Management Models

Part 2

Short Answer Questions

Task-2 short answer questions should be precise but complete and informative and the number of words within 1500 -1800 words.

Your task in this section is to prepare a response to each of the questions. Please refer to the marking guide when preparing your response to see what criteria will be used to assess your work and your progress towards the learning outcomes.

a)Research into the different types of biometric systems which are currently available for access control systems. Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages of the three types below. Give an example application when each type could be used: (5 marks)

-Fingerprint
-Hand Geometry
-Iris Recognition

b) Other than security concerns, privacy is considered a core value and is recognized either implicitly or explicitly as a fundamental human right. Privacy-enhancing technologies (PETs) can be defined as technologies that enforce legal privacy principles in order to protect and enhance the privacy of users of information technology. Research and discuss three PETs which can be used on the Internet. Use examples to illustrate your answer. [5 marks]

a) Wireless sensor networks (WSNs) can be described as a network of nodes that makes a collaborative effort in sensing data around its periphery and its surrounding environment. Research into the area of WSNs and understand the WSN architecture and protocol stack. Discuss three different types of threats and vulnerabilities which can be used to attack the WSN. Give your recommendations on how the threats and vulnerabilities can be mitigated for the WSN. [5 marks].

This assessment task will assess the following learning outcome/s:

1. Be able to justify the goals and various key terms used in risk management and assess IT risk in business terms.

2. Be able to critically analyze the various approaches for mitigating security risk, including when to use insurance to transfer IT risk.

3. Be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Task 3

The value of this assessment task is 20%. The submission method for this task is an alternative method.

This assessment task has 2 parts:

Part 1

Online Quiz

The online quiz must be attempted by the students individually on the Interact site for ITC596. The Quiz is worth 5 marks of the overall marks available for task 3.

Students need to attempt and finish the online quizzes within the specific date and time window. You will have an hour (1 hour) to complete the quiz which consists of 30 multiple choice questions. Once you start your quiz, you must complete it in one sitting. You only have one attempt at the quiz.

The topics of the online quizzes are:

a. Information Security Fundamentals
b. Information Security Planning
c. Information Security Policy and Program
d. Information Security Management Models
e. Foundations of IT Risk Management 1: Identifying Risks
f. Foundations of IT Risk Management 2: Assessing Risks
g. Foundations of IT Risk Management 3: Controlling Risks
i. IT Security Protection Mechanisms 1: Firewalls and Intrusion Detection Systems
j. IT Security Protection Mechanisms 2: Cryptographic Systems

ITC596 IT Risk Management, IT Risk Management, ITC596

Part 2

Risk Assessment Report

Your deliverable for this ITC596 task is an IT Risk Assessment report, written for the intended audience of management providing a risk assessment of a project. The project can be in any of the following areas:

a. Cybersecurity
b. Internet of Things
c. Cloud security
d. Mobile health devices
e. Bring Your Own Device
f. Smart vehicles
g. Or an area in your profession

Scenario options:

1. You can work towards the scenario provided below; or

2. You also have the opportunity to choose your own scenario-based risk assessment that could potentially be drawn from your own professional experience or context. The second option requires a discussion with and approval by your Subject Coordinator. The report structure requirements and criteria should be the same regardless of your scenario.

Provided scenario

You have been taking on as the IT risk Assessment lead consultant for an organization. You are needed to provide the IT assessment report to the management in the department or section that is running the project for the organization.

How to complete this task:

1.You will write a report on the project IT risks based on the scenario.

2. Your report must be 10 – 15 pages in length at 12 point font and single spacing on Microsoft Word document. The report must address the following criteria: An Executive Summary at the beginning of the report which provides a clear statement of the technology project that is being assessed, and an overview of your recommendations to management as to the merits of the project based on your risk assessment (2 – 3 pages in length).

A risk assessment based on threats, vulnerabilities and consequences derived from an IT control framework and any existing industry risk recommendations for the project. Identify and discuss the key threat agents. What could be done to mitigate the risks and their impact on the system? (4 – 10 pages in length).

Provide a brief summary (literature review) of protection mechanisms you could employ for the information security. (2 – 4 pages in length).

3. The report is worth 15 marks of the overall marks available for assessment 3. Engaging with scenario-based tasks provides you with the opportunity to simulate the real- world application of your learning in this subject.

Challenge may face by students

Students may face several feedbacks and problems in the completion of ITC596 IT Risk Management such as lack of good academic writing skills, insufficient time, making proper reference list etc. By taking our expert’s help and guidance, you can complete your assignment with high-quality. Students can explore the topic in-depth and excel their grades by taking our subject expert’s help. With OZ Assignments, get necessary academic guidance and tutorial help in ITC596 IT Risk Management Assignment. Get feedback amendment without any additional cost. Our aim is to resolve students’ various academic issues so that they can live stress-free academic lives.