ISOL533 Analytics Uses In Information Security Risk Management

User Generated

qbjagbjaenfpnyf

Writing

Description

MAKE SURE to use project templates attached to the post

Paper counts exclusing introduction and references

Research paper: 10 Pages minimum maximum of 15 pages

PPT: 10 pages minimum

Topics for Risk Management Research Paper and Presentation

The majority of the paper MUST address the highlighted topic below as it relates to Information Security Risk Management. Specific hardware, software, service or systems may be used as short examples but should only represent a small portion of the total paper.

Select one or both of the following topics

1. InfoSec Disaster Recovery Plans, Business Continuity Plans and Continuity of Operations Plans

2. How Analytics is used in Information Security Risk Management

This research paper should include approximately 7-10 Cited Works but MUST have at least 5 Cited Works of which 2 must be

Peer Reviewed. Highlight in YELLOW the Peer-Reviewed works on the Reference page. Also, include all References as the last page of the Powerpoint Presentation (start by creating a heading called “Peer-Reviewed works”, followed by the Peer- Reviewed works. Then create a heading called “All Other works”, followed by the other works).

This research paper should be approximately 10 double-spaced pages (but must be at least 5 pages), using 12-font Times-Roman or Calibri-Body. The Cover Page, Reference Page and any space needed for pictures/images are not included in the required pages.

Once the paper is completed, add an Overview/Executive Summary to the start of the paper. The Overview must contain at least one Hypothesis (see Rubric) and a Synopsis of what is contained in the paper. Include the Hypothesis, under the title, on the 1stpage of the Powerpoint presentation.

For this paper, a Hypothesis is a statement you believe to be true based on the research you conducted. As an example:

“Small businesses are less likely to provide adequate physical security”.

The quality and thoroughness of the paper, as defined in the rubric, will determine the grade assigned. Papers containing the minimum number of references and/or minimum number of pages will most likely not earn a high grade.

Unformatted Attachment Preview

Research Project Rubric Component Project Overview Justification for Hypotheses Supporting Evidence Review of Relevant Research Maintains Purpose / Focus     Methodology Sample Procedures Measures Data analytic plan Grammar, Clarity, and Organization References and Citations Exemplary (3) Effectively and insightfully develops a set of testable, supportable and impactful study hypotheses The introduction section provides a cogent overview of conceptual and theoretical issues related to the study hypotheses. Demonstrates outstanding critical thinking. Adequate (2) Develops a set of testable and supportable hypotheses Inadequate (1) Hypotheses are not testable or justifiable The introduction section provides a logical overview of conceptual and theoretical issues related to the study hypotheses. Demonstrates competent critical thinking. Very little support for the conceptual and theoretical relevant to the study hypotheses was provided. Provides little evidence of sound critical thinking. Provides clearly appropriate evidence to support position Sophisticated integration, synthesis, and critique of literature from related fields. Places work within larger context. Provides adequate evidence to support position Provides a meaningful summary of the literature. Shows understanding of relevant literature. The project has an organizational structure and the focus is clear throughout Identifies appropriate methodologies and research techniques but some details are missing or vague Provides little or no evidence to support position Provides little or no relevant scholarship The project is well organized and has a tight and cohesive focus that is integrated throughout the document Identifies appropriate methodologies and research techniques (e.g., justifies the sample, procedures, and measures). Data analytic plan is suitable to test study hypotheses. Provides appropriate justification for controls. Project is feasible The manuscript is well written and ideas are well developed and explained. Sentences and paragraphs are grammatically correct. Uses subheadings appropriately. Properly and explicitly cited. Reference list matches citations. The manuscript effectively communicates ideas. The writing is grammatically correct, but some sections lack clarity. Properly cited. May have a few instances in which proper citations are missing. The document lacks focus or contains major drifts in focus The methodologies described are either not suited or poorly suited to test hypotheses. The methodology is under-developed and/or is not feasible. The manuscript is poorly written and confusing. Ideas are not communicated effectively. The manuscript lacks proper citations or includes no citations 1 Enter the Title of the Research Paper here ISOL ??? - Group # ?? Group Members: Name Name Name Etc Hypothesis: xxxxxxxxxxxxxxxxxxxx  Summarize the Overview here  Summarize each of your main topics as separate slides  Peer Reviewed references: ◦ xxxxxxxxxxx ◦ Xxxxxxxxxxx  Other references: ◦ Xxxxxxxxxxx ◦ xxxxxxxxxxx ISOL 533 RESIDENCY WEEKEND RESEARCH PAPER 1 [ Enter Title of Paper here ] [ Enter Group # and the names {Last, First} of all Group members ] Overview / Executive Summary [Replace this Note and enter an Overview here. The overview should be added after the content of the paper is completed. The overview should be approximately one paragraph of between 150 and 250 words and summarize the content of the paper. You must add 1-or-more Hypothesis below (in this case, a Hypothesis is a short statement of what your research discovered.] Hypothesis: 1. 2. ISOL 533 RESIDENCY WEEKEND RESEARCH PAPER 2 [Remove this note and enter your paper here. Your paper must be at least 5 pages, 12 font double-spaced and use one inch margins for all paragraphs. The Title page and Reference / Works-Cited pages are NOT included in the 5-page requirement. Any added pictures or images are NOT included in the 5-page requirement. Do not add an Introduction or Abstract since these should be covered in the Overview above. References are added to the last page (consider using the Citations & Bibliography feature in the References tab. To customize a citation, right-click it and then click Edit Citation). There must be at least 5 cited references of which 2 must be peer-reviewed. Highlight in YELLOW the peer-reviewed works on the reference works-cited page. (see example at end of this document) ISOL 533 RESIDENCY WEEKEND RESEARCH PAPER References Last Name, F. M. (Year). Article Title. Journal Title, Pages From - To. Retrieved from url-1 Last Name, F. M. (Year). Book Title. City Name: Publisher Name. City 3
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: INFORMATION SECURITY RISK MANAGEMENT

How Analytic is used in Information Security Risk Management
Name
Institution
Date

1

INFORMATION SECURITY RISK MANAGEMENT

2

Contents
Summary ......................................................................................................................................... 3
Introduction ..................................................................................................................................... 4
Hypothesis....................................................................................................................................... 5
Literature Review............................................................................................................................ 5
Methodology ................................................................................................................................... 5
Conclusion .................................................................................................................................... 13
References ..................................................................................................................................... 14
Peer-reviewed ............................................................................................................................... 14
Others ............................................................................................................................................ 14

INFORMATION SECURITY RISK MANAGEMENT
How Analytic is used in Information Security Risk Management
Summary
Advancement in technology has increased the rates of cyber insecurity. Hackers
and people with malicious intentions are able to access private information belonging to
organizations and customers. The information is used for destroying such businesses and
personal information for the clients may be used to steal from them. The insecurity has
called for sophisticated measures to be implemented to protect a company’s data.
Information Security Risk Management (ISRM) is one of the modern approaches used in
identification, analyzing and controlling risks associated with information assets. ISRM
operates with business analytics to make sure that a company is free from any form of
external attack. Business analytics require security analytics capabilities as it helps in
generating insights which are related to the security on the ways of securing the business
data to prevent from external attack, which may harm the business operations. The IT
security focuses on the governance, risk and compliance efforts that should be used in the
company. When the business is risk-free, it is able to compete fairly in the market.

3

INFORMATION SECURITY RISK MANAGEMENT

4

Introduction
Information Security Risk Management (ISRM) is a process done continuously in an
organization in the identification, analyzing and controlling risks associated with information
assets. The information assets include the process of manufacturing, sensitive personal data,
strategies used in negotiation, product design and any data explaining how the business operates.
The success of any organization relies upon the use of effective information systems as they are
able to manage risks effectively. Due to the advancements in technology, ISRM should be
updated continuously to make sure that it is effective as well as offering a competitive advantage
to an organization. Research on ISRM should be done also for a company to develop the
capabilities of ISRM which are suitable, which is mainly being able to identify and ensure that
the information assets of a business are protected.
Business analytics is used by businesses as a way of achieving their operational
objectives. There are two types of applications related to business analytics with the first being
reporting and the second being analysis. The applications are essential in the building of models
that are predictive and essential in forecasting and optimizing the processes of the company, thus
enhancing the performance of a business (Guha, & Kumar, 2018). Business analytics require
security analytics capabilities as it helps in generating insights which are related to the security
on the ways of securing the business data to prevent from external attack, which may harm the
business operations. ISRM is applicable in different processes in a company from supply chain
management, managing customer relations, and marketing. When a business has unique
capabilities by exploiting the available resources, it is able to compete fairly in the business
market.

INFORMATION SECURITY RISK MANAGEMENT

5

Hypothesis
1.

Organizations which have implemented Information Security Risk Management are more

successful than the ones which do not have the systems.
2.

The choice of Information Security Risk Management determines operation effectiveness.

Methodology
I used the internet when researching about Information Security Risk
Management. There are lots of written researches published concerning how companies
are transitioning from traditional security systems to the modern ones. I also used Google
Scholar to look for peer-reviewed articles. I used several websites on the internet which
had reliable information. When searching for the articles to use during the research, I had
keywords such as Information Security Risk Management (ISRM), security systems,
business analytics, security analytics, risk management, internet attacks, and hacking. I
was able to access lots of articles but through the keywords, I narrowed them down. I
then used current dates to choose the final articles that I will be using. Selecting the most
current articles was essential to ...


Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags