Lab #2 Assessment Worksheet Align Risks, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls 1. a. Unauthorized access from public internet - HIGH b. User destroys data in application and deletes all files - LOW c. Workstation OS has a known software vulnerability – HIGH d. Communication circuit outages - MEDIUM e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers - MEDIUM 2. a. PO9.3 Event Identification
Words: 934 - Pages: 4
Align Risks, Threats & Vulnerabilities to COBIT Lab 2 1. List indentified threats & vulnerabilities Risk Factors from Lab1 a. Unauthorized access from public Internet High risk b. User destroys data in application and deletes files High risk c. Hacker penetrates your IT infrastructure and Medium risk gains access to your internal network d. Intra-office employee romance gone bad High risk
Words: 719 - Pages: 3
Bulk Handling ltd (CBH) 7.4 Problems occurred 7.5 Solution and implementation 7.6 Benefits 7. Comparison SAP at Tata steel and Co -operative bulk handling 8. References Acknowledgement Through this case study we get the opportunity to learn about the process of implementation of ERP so we thanks to all those who guided us and corrected us at each step in making of this case study and helped us for making successful and satisfactory completion of this case study. We
Words: 2397 - Pages: 10
Accounting and the Business Environment Lecture Notes Chapter theme: This chapter serves four main purposes. First, it explains the differences and similarities between financial and managerial accounting. Second, it describes the role of management accountants in an organization. Third, it explains the basic concepts underlying Lean Production, the Theory of Constraints (TOC), and Six Sigma. Fourth, it discusses the importance of upholding ethical standards. I. Globalization
Words: 2917 - Pages: 12
MIT Sloan School of Management MIT Sloan School Working Paper 4933-11 Developing a Common Language About IT Risk Management George Westerman and Richard Hunter ©George Westerman and Richard Hunter All rights reserved. Short sections of text, not to exceed two paragraphs, may be quoted without explicit permission, provided that full credit including © notice is given to the source. This paper also can be downloaded without charge from the Social Science Research Network Electronic
Words: 5211 - Pages: 21
Transnet is a state owned company (SOC) which is a custodian of freight rail, ports and pipeline. It is responsible for enabling competitiveness, growth and development of the South African economy through the delivery of reliable transport and handling of services that satisfy customer demand. Its mandate from the government is to assist in lowering the cost of doing business in South Africa, thus enabling economic growth and ensuring security of supply through providing appropriate ports, rail
Words: 2234 - Pages: 9
Topic: China’s financial liberalization Title: China’s financial liberalization and the policy transformation towards openness Author: Xuepan Cheng 4136801 Abstract This paper focused on the research of China’s financial liberalization reform in order to discuss the economic and financial effects casted by financial liberation. Also the article pointed out the current problems of China’s financial system and provided suggestions for implementation. The main argument of policy suggestions for China
Words: 2952 - Pages: 12
evaluation inspection five years ago. The company subsequently corrected this violation and has since enjoyed a good overall environmental compliance record. This paper will identify potential tort risks resulting from this violation and utilize the seven-step Harb process to mitigate associated business risks. Torts Alumina Inc. is considered one of the largest aluminum makers in the world. The company operates in Erehwon and is under the EPS’s jurisdiction in region 6. The first tort against Alumina
Words: 1276 - Pages: 6
GIAC Enterprises Security Controls Implementation Plan Group Discussion and Written Project John Hally, Erik Couture 08/07/2011 GIAC Enterprises – Security Controls Implementation Plan Table of Contents Executive Summary Introduction Security Controls Implementation Plan Incident Response Weekend Plan Conclusions References 3 3 4 6 9 9 2 GIAC Enterprises – Security Controls Implementation Plan Executive Summary The cyber-threat landscape has evolved significantly in recent
Words: 3167 - Pages: 13
Memo To: Senior Management From: Portfolio Management Team Date: September 27, 2011 Re: SBU Proposal Industry Background Ford Motors Corporation was started by Henry Ford. Born in Wayne County, Michigan, in an area that later became Dearborn, on July 30, 1863, Henry Ford was the oldest of six children. In April 1888, Ford married Clara Bryant, a local girl and the foster child of—like Henry—Irish immigrant farmers. In 1893, his only child, Edsel, was born. Success soon came to him as he
Words: 2456 - Pages: 10