SlideShare a Scribd company logo
Assignments: Unit 4
· Listen to the audio lecture.
· Read chapter four.
· Watch adjusting and closing entries videos.
· Complete the Interactive Presentation below.
· Complete the self quiz below.
· Complete the quiz below.
· Complete the homework exercises below.
Unit 4 - Complete by Sunday 11:59 pm (EST) September 25,
2016 End of Unit 4
Chapter 4 - Adjustments, Financial Statements and the Quality
of Financial Reporting
Interactive Presentation, Assignments, Discussion Board #4 and
Quiz
Note: if you click the Course Information Tab (top left hand
corner) Click hyperlink Launch Book Holder, you will be able
to launch the E=Book for this class.
Risk Assessment documentation templates are located within
this section. Make additional copies as needed. In a real risk
analysis process, one of the first steps is meeting with all
department managers, upper management, employee
representatives, and workers in the production environment,
human resources staff, and other staff members to get their
input. Without input from the people actually doing the work,
you might not think of essential factors. That isn't possible
here, so direct any questions you have to the instructor, or do
independent research to find your answers.
· First, identify the business processes that must continue for
the organization to keep functioning—for example, collecting
money from customers, receiving and processing sales,
developing new products, and so on. Document major business
processes that drive SunGrafix, using the Business Process
column of the Business Process Identification Worksheet. (You
need your imagination and some common sense for this step.)
Assign a priority level to each process (using the priority
rankings in the following list). Write down the department that
performs the process, and leave the Assets Used column blank
for now. Next, identify the organization's assets. Using the
Asset Identification Worksheet that is provided in the Course
Documents section on Blackboard, list each asset, its location,
and approximate value, if known. (For multiple identical assets,
describe the asset and list the quantity instead of listing each
individual asset.) In organization-wide risk assessments, you
would list all assets, including office furniture, industrial
equipment, personnel, and other assets. For this project, stick to
information technology assets, such as computers, servers, and
networking equipment, etc. The information you enter depends
on the network design you completed earlier. All the equipment
needed to build your network should be listed here as well as
any cabling in the facility. (Assume the facility is already wired
for a computer network with network drops available for each
computer.) Hint: Remember to list items such as electricity and
your Internet connection.Next, determine which assets support
each business process. On your Business Process Identification
Worksheet, list the assets needed for each business process in
the Assets Used column.
· Critical — Absolutely necessary for business operations to
continue. Loss of a critical process halts business activities.
· Necessary — Contributes to smooth, efficient operations. Loss
of a necessary process doesn't halt business operations but
degrades working conditions, slows production, or contributes
to errors.
· Desirable — Contributes to enhanced performance and
productivity and helps create a more comfortable working
environment, but loss of a desirable process doesn't halt or
negatively affect operations.
· Next, determine which assets support each business process.
On your Business Process Identification Worksheet, list the
assets needed for each business process in the Assets Used
column.
· Each process should be documented and have a priority
assigned to it. Next, transfer the priority rankings to your Asset
Identification Worksheet. Now you know which assets are the
most critical to restore and warrant the most expense and effort
to secure. You also have the documentation to back up your
security actions for each item.
· The final step is assessing existing threats. The table below
shows examples of ways to evaluate some types of threats and
suggests ways to quantify them. On the Threat Identification
and Assessment Worksheet, list each possible threat. Be sure to
consider threats from geographic and physical factors,
personnel, malicious attack or sabotage, and accidents. Also,
examine the facility diagram you created for flaws in the
facility layout or structure that could pose a threat, such as air-
conditioning failure or loss of electrical service. Assess the
probability of occurrence (POC) on a 1 to 10 scale, with 1 being
the lowest and 10 the highest, and assign those ratings in the
POC column for each threat.
Type of Threat
How to Quantify
Severe rainstorm, tornado, hurricane, earthquake, wilderness
fire, or flood
Collect data on frequency, severity, and proximity to facilities.
Evaluate the past quality and speed of local and regional
emergency response systems to determine whether they helped
minimize loss.
Train derailment, auto/ truck accident, toxic air pollution
caused by accident, or plane crash
Collect data on the proximity of railroads, highways, and
airports to facilities. Evaluate the construction quality of
transportation systems and the rate of serious accidents on each
system.
Building explosion or fire
Collect data on the frequency and severity of past incidents.
Evaluate local emergency response to determine its
effectiveness.
Militant group attacking facilities, riot, or civil unrest
Collect data on the political stability of the region where
facilities are located. Compile and evaluate a list of groups that
might have specific political or social issues with the
Organization.
Computer hack (external) or computer fraud (internal)
Examine data on the frequency and severity of past incidents.
Evaluate the effectiveness of existing computer security
measures.
· Next, using the Asset Identification Worksheet, determine
which assets would be affected by each threat. List those assets
in the Assets Affected column of the Threat Identification and
Assessment Worksheet. For an electrical outage, for example,
list all assets requiring electricity to operate; for a hardware
failure, list all assets a hardware failure would disrupt, damage,
or destroy
· In the Consequence column, enter the consequences of the
threat occurring, using the following designations: Next, rate
the severity of each threat in the Severity column, using the
same designations as in the preceding list for consequences (C,
S, M, or I). You derive these ratings by combining the
probability of occurrence, the asset's priority ranking, and the
potential consequences of a threat occurring. For example, if an
asset has a Critical (C) priority ranking and a Catastrophic (C)
consequence rating, it has a Catastrophic (C) severity rating. If
you have mixed or contradictory ratings, you need to re-
evaluate the asset and use common sense. A terrorist attack that
destroys the facility and kills half the staff might have a
probability of occurrence (POC) of only 1 (depending on your
location), but if it happened, the consequences would definitely
be catastrophic. Even so, because of the low POC, you wouldn't
necessarily rank its severity as catastrophic.
· Catastrophic (C)—Total loss of business processes or
functions for one week or more. Potential complete failure of
business.
· Severe (S)—Business would be unable to continue functioning
for 24 to 48 hours. Losses of revenue, damage to reputation or
confidence, reduction of productivity, complete loss of critical
data or systems.
· Moderate (M)—Business could continue after an interruption
of no more than 4 hours. Some loss of productivity and damage
or destruction of important information or systems.
· Insignificant (I)—Business could continue functioning without
interruption. Some cost incurred for repairs or recovery. Minor
equipment or facility damage. Minor productivity loss and little
or no loss of important data.
· Finally, on the Threat Mitigation Worksheet, list assets that
are ranked as the most critical and threatened with the highest
severity. In the Mitigation Techniques column, list
recommendations for mitigating threats to those assets. For
example, to mitigate the threat of an electrical outage damaging
a critical server, you might suggest a high-end uninterruptible
power supply (UPS).
Threat Mitigation Worksheet
Form # TM01
Page ____ of _____
Business Name:
Address:
Facility # 001
Contact:
Phone number:
E-mail:
Asset
Threat
Mitigation Techniques
Threat Identification and Assessment Worksheet
Form # TIDA01
Page ____ of _____
Business Name:
Address:
Facility # 001
Contact:
Phone number:
E-mail:
Threat
POC
Assets Affected
Consequence (C, S, M, I)
Severity (C, S, M, I)
Asset Identification Worksheet
Form # AID01
Page ____ of _____
Business Name:
Address:
Facility # 001
Contact:
Phone Number:
E-mail:
Asset
Quantity
Department or Location
Value
Priority
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
Business Process Identification Worksheet
Form # BPID01
Page ____ of _____
Business Name:
Address:
Facility # 001
Contact:
Phone number:
E-mail:
Business Process
Priority
Department
Assets Used
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A
C N D
N/A

More Related Content

Similar to Assignments Unit 4· Listen to the audio lecture.· Read chapte.docx

Crucial Steps to Cyber Resilience: A Guide to Effective VAPT
Crucial Steps to Cyber Resilience: A Guide to Effective VAPTCrucial Steps to Cyber Resilience: A Guide to Effective VAPT
Crucial Steps to Cyber Resilience: A Guide to Effective VAPT
ShyamMishra72
 
Task 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaiTask 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remai
alehosickg3
 
Cmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWCmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEW
shyamuop
 
CMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWCMGT 433 Entire Course NEW
CMGT 433 Entire Course NEW
shyamuopuop
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
tienboileau
 
Top 5 Steps to Disaster Preparedness for Businesses
Top 5 Steps to Disaster Preparedness for BusinessesTop 5 Steps to Disaster Preparedness for Businesses
Top 5 Steps to Disaster Preparedness for Businesses
- Mark - Fullbright
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
Pace IT at Edmonds Community College
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docx
DarkKnight367793
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
donaldzs8
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
DavisMurphyA97
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
McdonaldRyan79
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
robertlesew6
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMWajahat Ali Khan
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
Baileyabw
 
College of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docxCollege of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docx
mccormicknadine86
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.com
Davis11a
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
PrescottLunt385
 
Rubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docxRubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docx
toddr4
 
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 ISE 510 Final Project Guidelines and Rubric Overview The fi.docx ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
aryan532920
 

Similar to Assignments Unit 4· Listen to the audio lecture.· Read chapte.docx (20)

Crucial Steps to Cyber Resilience: A Guide to Effective VAPT
Crucial Steps to Cyber Resilience: A Guide to Effective VAPTCrucial Steps to Cyber Resilience: A Guide to Effective VAPT
Crucial Steps to Cyber Resilience: A Guide to Effective VAPT
 
Task 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remaiTask 1.Complete the BIA table below and use it for the remai
Task 1.Complete the BIA table below and use it for the remai
 
Cmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEWCmgt 433 Entire Course NEW
Cmgt 433 Entire Course NEW
 
CMGT 433 Entire Course NEW
CMGT 433 Entire Course NEWCMGT 433 Entire Course NEW
CMGT 433 Entire Course NEW
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
Top 5 Steps to Disaster Preparedness for Businesses
Top 5 Steps to Disaster Preparedness for BusinessesTop 5 Steps to Disaster Preparedness for Businesses
Top 5 Steps to Disaster Preparedness for Businesses
 
Dit yvol4iss50
Dit yvol4iss50Dit yvol4iss50
Dit yvol4iss50
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
 
Determine Maintenance strateg.docx
Determine Maintenance strateg.docxDetermine Maintenance strateg.docx
Determine Maintenance strateg.docx
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
 
Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
 
College of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docxCollege of Administrative and Financial SciencesAssignment 1.docx
College of Administrative and Financial SciencesAssignment 1.docx
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.com
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
 
Rubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docxRubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docx
 
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 ISE 510 Final Project Guidelines and Rubric Overview The fi.docx ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 

More from rock73

In a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docxIn a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docx
rock73
 
In a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docxIn a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docx
rock73
 
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docxIn a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
rock73
 
In a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docxIn a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docx
rock73
 
in a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docxin a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docx
rock73
 
In a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docxIn a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docx
rock73
 
In a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docxIn a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docx
rock73
 
In a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docxIn a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docx
rock73
 
In a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docxIn a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docx
rock73
 
In a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docxIn a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docx
rock73
 
In a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docxIn a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docx
rock73
 
in a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docxin a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docx
rock73
 
In a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docxIn a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docx
rock73
 
In a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docxIn a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docx
rock73
 
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docxBASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
rock73
 
Based on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docxBased on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docx
rock73
 
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
Barbara Corcoran Learns Her Heart’s True Desires  In her.docxBarbara Corcoran Learns Her Heart’s True Desires  In her.docx
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
rock73
 
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docxBapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
rock73
 
Barriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docxBarriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docx
rock73
 
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docxBarada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
rock73
 

More from rock73 (20)

In a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docxIn a two- to three-page paper (excluding the title and reference pag.docx
In a two- to three-page paper (excluding the title and reference pag.docx
 
In a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docxIn a substantial paragraph respond to either one of the following qu.docx
In a substantial paragraph respond to either one of the following qu.docx
 
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docxIn a study by Dr. Sandra Levitsky, she considers why the economic,.docx
In a study by Dr. Sandra Levitsky, she considers why the economic,.docx
 
In a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docxIn a response of at least two paragraphs, provide an explanation o.docx
In a response of at least two paragraphs, provide an explanation o.docx
 
in a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docxin a minimum of 1000 words, describe why baseball is Americas past .docx
in a minimum of 1000 words, describe why baseball is Americas past .docx
 
In a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docxIn a minimum 200 word response, describe some ways how the public .docx
In a minimum 200 word response, describe some ways how the public .docx
 
In a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docxIn a weekly coordination meeting, several senior investigators from .docx
In a weekly coordination meeting, several senior investigators from .docx
 
In a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docxIn a memo, describe 1) the form and style of art as well as 2) the e.docx
In a memo, describe 1) the form and style of art as well as 2) the e.docx
 
In a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docxIn a minimum 200 word response explain the problems that law enforce.docx
In a minimum 200 word response explain the problems that law enforce.docx
 
In a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docxIn a minimum 200 word response explain some of the reasons why, in.docx
In a minimum 200 word response explain some of the reasons why, in.docx
 
In a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docxIn a maximum of 750 words, you are required to1. Summarize the ar.docx
In a maximum of 750 words, you are required to1. Summarize the ar.docx
 
in a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docxin a two- to- three page paper (not including the title and referenc.docx
in a two- to- three page paper (not including the title and referenc.docx
 
In a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docxIn a two- to three-page paper (not including the title and reference.docx
In a two- to three-page paper (not including the title and reference.docx
 
In a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docxIn a group, take a look at the two student essays included in this f.docx
In a group, take a look at the two student essays included in this f.docx
 
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docxBASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
BASEBALLRuns Scored (X)Wins (Y)70869875906547970480787957307166786.docx
 
Based on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docxBased on Santa Clara University Ethics DialogueEthics .docx
Based on Santa Clara University Ethics DialogueEthics .docx
 
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
Barbara Corcoran Learns Her Heart’s True Desires  In her.docxBarbara Corcoran Learns Her Heart’s True Desires  In her.docx
Barbara Corcoran Learns Her Heart’s True Desires In her.docx
 
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docxBapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
Bapsi Sidhwa’s Cracking India1947 PartitionDeepa Meh.docx
 
Barriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docxBarriers of therapeutic relationshipThe therapeutic relations.docx
Barriers of therapeutic relationshipThe therapeutic relations.docx
 
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docxBarada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
Barada 2Mohamad BaradaProfessor Andrew DurdinReligions of .docx
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

Assignments Unit 4· Listen to the audio lecture.· Read chapte.docx

  • 1. Assignments: Unit 4 · Listen to the audio lecture. · Read chapter four. · Watch adjusting and closing entries videos. · Complete the Interactive Presentation below. · Complete the self quiz below. · Complete the quiz below. · Complete the homework exercises below. Unit 4 - Complete by Sunday 11:59 pm (EST) September 25, 2016 End of Unit 4 Chapter 4 - Adjustments, Financial Statements and the Quality of Financial Reporting Interactive Presentation, Assignments, Discussion Board #4 and Quiz Note: if you click the Course Information Tab (top left hand corner) Click hyperlink Launch Book Holder, you will be able to launch the E=Book for this class. Risk Assessment documentation templates are located within this section. Make additional copies as needed. In a real risk analysis process, one of the first steps is meeting with all department managers, upper management, employee representatives, and workers in the production environment, human resources staff, and other staff members to get their input. Without input from the people actually doing the work, you might not think of essential factors. That isn't possible here, so direct any questions you have to the instructor, or do independent research to find your answers. · First, identify the business processes that must continue for the organization to keep functioning—for example, collecting
  • 2. money from customers, receiving and processing sales, developing new products, and so on. Document major business processes that drive SunGrafix, using the Business Process column of the Business Process Identification Worksheet. (You need your imagination and some common sense for this step.) Assign a priority level to each process (using the priority rankings in the following list). Write down the department that performs the process, and leave the Assets Used column blank for now. Next, identify the organization's assets. Using the Asset Identification Worksheet that is provided in the Course Documents section on Blackboard, list each asset, its location, and approximate value, if known. (For multiple identical assets, describe the asset and list the quantity instead of listing each individual asset.) In organization-wide risk assessments, you would list all assets, including office furniture, industrial equipment, personnel, and other assets. For this project, stick to information technology assets, such as computers, servers, and networking equipment, etc. The information you enter depends on the network design you completed earlier. All the equipment needed to build your network should be listed here as well as any cabling in the facility. (Assume the facility is already wired for a computer network with network drops available for each computer.) Hint: Remember to list items such as electricity and your Internet connection.Next, determine which assets support each business process. On your Business Process Identification Worksheet, list the assets needed for each business process in the Assets Used column. · Critical — Absolutely necessary for business operations to continue. Loss of a critical process halts business activities. · Necessary — Contributes to smooth, efficient operations. Loss of a necessary process doesn't halt business operations but degrades working conditions, slows production, or contributes to errors. · Desirable — Contributes to enhanced performance and productivity and helps create a more comfortable working environment, but loss of a desirable process doesn't halt or
  • 3. negatively affect operations. · Next, determine which assets support each business process. On your Business Process Identification Worksheet, list the assets needed for each business process in the Assets Used column. · Each process should be documented and have a priority assigned to it. Next, transfer the priority rankings to your Asset Identification Worksheet. Now you know which assets are the most critical to restore and warrant the most expense and effort to secure. You also have the documentation to back up your security actions for each item. · The final step is assessing existing threats. The table below shows examples of ways to evaluate some types of threats and suggests ways to quantify them. On the Threat Identification and Assessment Worksheet, list each possible threat. Be sure to consider threats from geographic and physical factors, personnel, malicious attack or sabotage, and accidents. Also, examine the facility diagram you created for flaws in the facility layout or structure that could pose a threat, such as air- conditioning failure or loss of electrical service. Assess the probability of occurrence (POC) on a 1 to 10 scale, with 1 being the lowest and 10 the highest, and assign those ratings in the POC column for each threat. Type of Threat How to Quantify Severe rainstorm, tornado, hurricane, earthquake, wilderness fire, or flood Collect data on frequency, severity, and proximity to facilities. Evaluate the past quality and speed of local and regional emergency response systems to determine whether they helped minimize loss. Train derailment, auto/ truck accident, toxic air pollution
  • 4. caused by accident, or plane crash Collect data on the proximity of railroads, highways, and airports to facilities. Evaluate the construction quality of transportation systems and the rate of serious accidents on each system. Building explosion or fire Collect data on the frequency and severity of past incidents. Evaluate local emergency response to determine its effectiveness. Militant group attacking facilities, riot, or civil unrest Collect data on the political stability of the region where facilities are located. Compile and evaluate a list of groups that might have specific political or social issues with the Organization. Computer hack (external) or computer fraud (internal) Examine data on the frequency and severity of past incidents. Evaluate the effectiveness of existing computer security measures. · Next, using the Asset Identification Worksheet, determine which assets would be affected by each threat. List those assets in the Assets Affected column of the Threat Identification and Assessment Worksheet. For an electrical outage, for example, list all assets requiring electricity to operate; for a hardware failure, list all assets a hardware failure would disrupt, damage, or destroy · In the Consequence column, enter the consequences of the threat occurring, using the following designations: Next, rate the severity of each threat in the Severity column, using the
  • 5. same designations as in the preceding list for consequences (C, S, M, or I). You derive these ratings by combining the probability of occurrence, the asset's priority ranking, and the potential consequences of a threat occurring. For example, if an asset has a Critical (C) priority ranking and a Catastrophic (C) consequence rating, it has a Catastrophic (C) severity rating. If you have mixed or contradictory ratings, you need to re- evaluate the asset and use common sense. A terrorist attack that destroys the facility and kills half the staff might have a probability of occurrence (POC) of only 1 (depending on your location), but if it happened, the consequences would definitely be catastrophic. Even so, because of the low POC, you wouldn't necessarily rank its severity as catastrophic. · Catastrophic (C)—Total loss of business processes or functions for one week or more. Potential complete failure of business. · Severe (S)—Business would be unable to continue functioning for 24 to 48 hours. Losses of revenue, damage to reputation or confidence, reduction of productivity, complete loss of critical data or systems. · Moderate (M)—Business could continue after an interruption of no more than 4 hours. Some loss of productivity and damage or destruction of important information or systems. · Insignificant (I)—Business could continue functioning without interruption. Some cost incurred for repairs or recovery. Minor equipment or facility damage. Minor productivity loss and little or no loss of important data. · Finally, on the Threat Mitigation Worksheet, list assets that are ranked as the most critical and threatened with the highest severity. In the Mitigation Techniques column, list recommendations for mitigating threats to those assets. For example, to mitigate the threat of an electrical outage damaging a critical server, you might suggest a high-end uninterruptible power supply (UPS).
  • 6. Threat Mitigation Worksheet Form # TM01 Page ____ of _____ Business Name: Address: Facility # 001 Contact: Phone number: E-mail: Asset Threat Mitigation Techniques
  • 7. Threat Identification and Assessment Worksheet Form # TIDA01 Page ____ of _____ Business Name: Address: Facility # 001 Contact: Phone number: E-mail: Threat
  • 8. POC Assets Affected Consequence (C, S, M, I) Severity (C, S, M, I)
  • 9. Asset Identification Worksheet Form # AID01 Page ____ of _____ Business Name: Address: Facility # 001
  • 10. Contact: Phone Number: E-mail: Asset Quantity Department or Location Value Priority C N D N/A C N D N/A C N D N/A C N D
  • 11. N/A C N D N/A C N D N/A C N D N/A C N D N/A C N D
  • 12. N/A C N D N/A C N D N/A Business Process Identification Worksheet Form # BPID01 Page ____ of _____ Business Name: Address: Facility # 001 Contact: Phone number: E-mail: Business Process Priority Department
  • 13. Assets Used C N D N/A C N D N/A C N D N/A C N D N/A C N D N/A C N D N/A C N D N/A
  • 14. C N D N/A C N D N/A C N D N/A C N D N/A