Law Question
Style | APA |
Number of words | 1301 |
Number of sources | 0 |
Spacing | Double |
PowerPoint slides | 0 |
Module 4 – Case
CYBER RISK ASSESSMENT AND CYBER INSURANCE
Case Assignment
There are various methods in conducting a risk assessment. Any method used is likely to include in some shape or form hazards, vulnerabilities, and impacts. Once completed, this risk assessment can be used to develop strategies to prepare, respond, recover, and mitigate cyber threats.
For this case, answer the following:
Assignment Expectations
Assignments should be 4-5 full pages, double-spaced, not counting the cover or reference page. Paper format: (a) Cover page, (b) Header, (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.
Relevance—All content is connected to the question.
Depth of discussion—Present and integrate points that lead to deeper issues.
Breadth—Multiple perspectives and references, multiple issues/factors considered.
Evidence—Points are well-supported with facts, statistics, and references.
Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
Clarity—Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity—Avoids use of first person and subjective bias.
References—Sources are listed at the end of the paper.
Use strong credible sources – peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s).
_______________________________________________________________________________________________
Module 4 – Background
CYBER RISK ASSESSMENT AND CYBER INSURANCE
Required Reading
Boot, Max (2015, July 12). What is the greatest threat to U.S. national security? Commentary. Retrieved from https://www.commentarymagazine.com/american-societ…
Causey, B. (2013, January), How to conduct an effective IT security risk assessment. Retrieved from https://security.vt.edu/content/dam/security_vt_ed…
Hartwig, R. P. (2014). Cyber risks: The growing threat. Insurance Information Institute. Retrieved from https://www.iii.org/sites/default/files/docs/pdf/p…
Howard, T., & Cruz, J. (2017). A cyber vulnerability assessment of the U.S. Navy in the 21st Century. Retrieved from http://cimsec.org/cyber-vulnerability-assessment-u…
Romanosky, S., Ablon, L., & Kuehn, A. (2017). A content analysis of cyber insurance policies. RAND. Retrieved from https://www.rand.org/pubs/external_publications/EP…
Required Websites
Federal Emergency Management Agency (FEMA) (n.d.). Risk Assessment. Retrieved from http://www.ready.gov/risk-assessment
Risk Assessment. IT Information Technology. Retrieved from https://www.it.iastate.edu/policies/risk
Requirements: Instructions provided above and on attachment.
20210324200208hls571_mod4_ca (1)
20210324200245hls571_mod4_background (1)