Risk Analysis Research
For this project, you will continue your research from Project #1 by reviewing and then analyzing your chosen company’s risk statements as published each year in the company’s Annual Report to Investors (also published in the company’s annual filing of SEC Form 10-K).
After analyzing the company’s IT operations and its risk statements about those activities, You will construct and document your own IT focused risk analysis including both its primary operations and all supporting business processes., Your risk analysis will also address information risks and technology risks which you identify in your research about the company.,
Note: before beginning this assignment you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments., Pay special attention to Appendix D: “Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events”, and Appendix H: “Impact: Effects of Threat Events on Organizations, Individuals, and the Nation.”
For this project, you will continue your research from Project #1 by reviewing and then analyzing your chosen company’s risk statements as published each year in the company’s Annual Report to Investors (also published in the company’s annual filing of SEC Form 10-K). After analyzing the company’s IT operations and its risk statements about those activities, you will construct and document your own IT focused risk analysis including both its primary operations and all supporting business processes. Your risk analysis will also address information risks and technology risks which you identify in your research about the company.
Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: “Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events” and Appendix H: “Impact: Effects of Threat Events on Organizations, Individuals, and the Nation.”
For this project, you will continue your research from Project #1 by reviewing and then analyzing your chosen company’s risk statements as published each year in the company’s Annual Report to Investors (also published in the company’s annual filing of SEC Form 10-K). After analyzing the company’s IT operations and its risk statements about those activities, you will construct and document your own IT focused risk analysis including both its primary operations and all supporting business processes. Your risk analysis will also address information risks and technology risks which you identify in your research about the company.
Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: “Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events” and Appendix H: “Impact: Effects of Threat Events on Organizations, Individuals, and the Nation.”