Description
MAKE SURE to use project templates attached to the post
Paper counts exclusing introduction and references
Research paper: 10 Pages minimum maximum of 15 pages
PPT: 10 pages minimum
Topics for Risk Management Research Paper and Presentation
The majority of the paper MUST address the highlighted topic below as it relates to Information Security Risk Management. Specific hardware, software, service or systems may be used as short examples but should only represent a small portion of the total paper.
Select one or both of the following topics
1. InfoSec Disaster Recovery Plans, Business Continuity Plans and Continuity of Operations Plans
2. How Analytics is used in Information Security Risk Management
This research paper should include approximately 7-10 Cited Works but MUST have at least 5 Cited Works of which 2 must be
Peer Reviewed. Highlight in YELLOW the Peer-Reviewed works on the Reference page. Also, include all References as the last page of the Powerpoint Presentation (start by creating a heading called “Peer-Reviewed works”, followed by the Peer- Reviewed works. Then create a heading called “All Other works”, followed by the other works).
This research paper should be approximately 10 double-spaced pages (but must be at least 5 pages), using 12-font Times-Roman or Calibri-Body. The Cover Page, Reference Page and any space needed for pictures/images are not included in the required pages.
Once the paper is completed, add an Overview/Executive Summary to the start of the paper. The Overview must contain at least one Hypothesis (see Rubric) and a Synopsis of what is contained in the paper. Include the Hypothesis, under the title, on the 1stpage of the Powerpoint presentation.
For this paper, a Hypothesis is a statement you believe to be true based on the research you conducted. As an example:
“Small businesses are less likely to provide adequate physical security”.
The quality and thoroughness of the paper, as defined in the rubric, will determine the grade assigned. Papers containing the minimum number of references and/or minimum number of pages will most likely not earn a high grade.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Running head: INFORMATION SECURITY RISK MANAGEMENT
How Analytic is used in Information Security Risk Management
Name
Institution
Date
1
INFORMATION SECURITY RISK MANAGEMENT
2
Contents
Summary ......................................................................................................................................... 3
Introduction ..................................................................................................................................... 4
Hypothesis....................................................................................................................................... 5
Literature Review............................................................................................................................ 5
Methodology ................................................................................................................................... 5
Conclusion .................................................................................................................................... 13
References ..................................................................................................................................... 14
Peer-reviewed ............................................................................................................................... 14
Others ............................................................................................................................................ 14
INFORMATION SECURITY RISK MANAGEMENT
How Analytic is used in Information Security Risk Management
Summary
Advancement in technology has increased the rates of cyber insecurity. Hackers
and people with malicious intentions are able to access private information belonging to
organizations and customers. The information is used for destroying such businesses and
personal information for the clients may be used to steal from them. The insecurity has
called for sophisticated measures to be implemented to protect a company’s data.
Information Security Risk Management (ISRM) is one of the modern approaches used in
identification, analyzing and controlling risks associated with information assets. ISRM
operates with business analytics to make sure that a company is free from any form of
external attack. Business analytics require security analytics capabilities as it helps in
generating insights which are related to the security on the ways of securing the business
data to prevent from external attack, which may harm the business operations. The IT
security focuses on the governance, risk and compliance efforts that should be used in the
company. When the business is risk-free, it is able to compete fairly in the market.
3
INFORMATION SECURITY RISK MANAGEMENT
4
Introduction
Information Security Risk Management (ISRM) is a process done continuously in an
organization in the identification, analyzing and controlling risks associated with information
assets. The information assets include the process of manufacturing, sensitive personal data,
strategies used in negotiation, product design and any data explaining how the business operates.
The success of any organization relies upon the use of effective information systems as they are
able to manage risks effectively. Due to the advancements in technology, ISRM should be
updated continuously to make sure that it is effective as well as offering a competitive advantage
to an organization. Research on ISRM should be done also for a company to develop the
capabilities of ISRM which are suitable, which is mainly being able to identify and ensure that
the information assets of a business are protected.
Business analytics is used by businesses as a way of achieving their operational
objectives. There are two types of applications related to business analytics with the first being
reporting and the second being analysis. The applications are essential in the building of models
that are predictive and essential in forecasting and optimizing the processes of the company, thus
enhancing the performance of a business (Guha, & Kumar, 2018). Business analytics require
security analytics capabilities as it helps in generating insights which are related to the security
on the ways of securing the business data to prevent from external attack, which may harm the
business operations. ISRM is applicable in different processes in a company from supply chain
management, managing customer relations, and marketing. When a business has unique
capabilities by exploiting the available resources, it is able to compete fairly in the business
market.
INFORMATION SECURITY RISK MANAGEMENT
5
Hypothesis
1.
Organizations which have implemented Information Security Risk Management are more
successful than the ones which do not have the systems.
2.
The choice of Information Security Risk Management determines operation effectiveness.
Methodology
I used the internet when researching about Information Security Risk
Management. There are lots of written researches published concerning how companies
are transitioning from traditional security systems to the modern ones. I also used Google
Scholar to look for peer-reviewed articles. I used several websites on the internet which
had reliable information. When searching for the articles to use during the research, I had
keywords such as Information Security Risk Management (ISRM), security systems,
business analytics, security analytics, risk management, internet attacks, and hacking. I
was able to access lots of articles but through the keywords, I narrowed them down. I
then used current dates to choose the final articles that I will be using. Selecting the most
current articles was essential to ...