SlideShare a Scribd company logo
1 of 16
Running head: RISK ASSESSMENT 1
RISK ASSESSMENT 4
Case Study Phase 1
Name
Class
Instructor
Date
Risk is defined as the possibility of a threat to exploit
vulnerabilities which are found within information systems to
cause harm and compromise data. Risk occurs in different types
and they affect information systems differently depending on
the vulnerability being exploited and there intended faction.
Risks in the industry financial sector in firms, such as
Wells Fargo, are associated with the loose of client information,
loss of financial proprietary information as well as the risk of
fraud when their information systems platform gets hacked. For
the research, risk on client information will be in focus as it is
the most prominent form of risks that various financial firm
face (McLaughlin, 2018). Risk towards client details occurs in
the form of hackers, a systems glitch which leads to clients
having a slow time accessing their funds and compromising of
client information which can mismatch of vital client
information leading to loses to the company.
Information and technology is an important aspect of
Wells Fargo operations since it keeps all the records of its
clients and tracking various transactions that the company
makes with different stakeholders. One of the risks that the
company faces is human error, since its employees are in charge
of ensuring they key in the right information, every now and
then, employees might key in the wrong information for a client
and this can lead to the company information systems holding
the wrong information pertaining to different clients. This
makes it easier for people to commit fraud and embezzle funds
from the bank (Willcocks, 2013).
Wells Fargo being a financial institution is repeatedly
under threat by hackers and people trying to amend their
financial situations which means that they need to ensure that
their financial systems are safe and have no risks which can be
exploited by any party. Being that the Wells Fargo is a major
credit company, the company risks the loss of its client’s data if
it happens to be hacked and also when clients provide their
private information to fraudsters who use the information to
conduct credit card fraud where they open up credit cards and
lines using the client’s name.
In the recent past, Wells Fargo has been accused of
opening up accounts for its clients without their consent which
is major personnel risk which the firm used to increase their
revenues but in the process ended up losing revenues through
court fines and a reduction of its brand market worth.
Information systems face internals risks as highlighted by this
move and having information systems which would warn
employees and the managers of the firm of various ethical
violations would have helped the company to maintain its
brand's and save revenue which it used to pay court fines and
damages (McLaughlin, 2018).
Wells Fargo as a firm, uses various algorithms to invest in
different projects to generate more revenue. The company faces
risk as the client's funds are used to invest in the projects to
ensure that the firm is able to cater for its operational costs.
Since the algorithm is based on the internet, it can get attacked
by different malware which would affect its performance giving
the wrong results (Willcocks, 2013). The wrong results will
mean that the company will be investing in projects which will
not achieve the expected return and this puts the client’s
finances at risk.
The risks are experienced by multiple financial firms
which lead to the firms investing in more modern and updated
systems which have been tested to have fewer bugs and to have
fewer risks compared to the prevailing information systems. The
financial industry tends to stay ahead of the market by investing
and acquiring new technology to ensure that it does not
comprised and the vulnerabilities are easily fixed since it is the
financier of most economies.
References
McLaughlin, T. (2018, February 01). Wells Fargo loses big
client after dialing up risk in retirement funds. Retrieved March
30, 2018, from https://www.reuters.com/article/us-wellsfargo-
funds-texas/wells-fargo-loses-big-client-after-dialing-up-risk-
in-retirement-funds-idUSKBN1FL5L5
Willcocks, L. (2013). Information management: the evaluation
of information systems investments. Springer.
Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K.
(2012). Computer security: principles and practice. Pearson
Education.
Module 5 Assignments
For this module you are required to complete the following
assignments:
· Chapter 9: exercises # 2 - 7
2. State three advantages of an Ethernet-based metropolitan area
network over a SONET-based metropolitan area network.
3. Which type of network application requires more elaborate
software: connection-oriented or connectionless? Explain.
4. Create an analogy similar to the telephone call/sending-a-
letter scenarios that demonstrates the differences between
connection-oriented and connectionless network applications.
5. Explain the difference between a network node and a network
station.
6. Does a datagram network require any setup time before a
packet is transmitted? If so, when and how often?
7. Does a virtual circuit network require any setup time before a
packet is transmitted? If so, when and how often?
Thinking Outside the Box #4
One form of congestion avoidance is the permit system, in
which a node must have a permit before it can transmit. Suppose
a wide area network is using a permit system to control
suggestion. What happens if, for some unknown reason, all the
permits disappear? How can this event be detected? How can
this event be repaired?
For this lab, you are completing a BIA for a company or
organization. The lab provides a list of
companies/organizations to choose from, which are listed
below. However, I prefer for students to complete the lab
assignment based upon the topic of choice for the case study
(Wells Fargo was the topic I chose, it is attached). So, if Bank
of America is the topic of your case study, then you would
complete a BIA for BOA. You are to complete the table
provided in Part A of the lab assignment. The far left column
contains business functions that may or may not apply to the
company/organization. You will determine this. You will rate
the criticality of the business function to the company or
organization and the applicable RTO for that business function.
You will then state how an interruption would impact the IT
infrastructure, which is the far right column. For example, what
impact would a disruption have within a company if that
function is not restored in a particular time? After completion
of the table, you will then provide an executive summary of the
table to present to upper management. This is part B of the
assignment. Part A is completion of the table provided in Part
A and Part B is the executive summary.
BIA Lab Options or you can use the topic of the case study
(Wells Fargo).
a. Healthcare provider under HIPAA compliance law
b. Regional bank under GLBA compliance law
c. Nationwide retailer under PCI DSS standard requirements
d. Higher-education institution under FERPA compliance law
Complete the Deliverables as assigned below.
Do Complete
1. Lab #7 – Assessment Worksheet, Part A - BIA of business
functions and operations2. Lab #7 – Assessment Worksheet,
Part B - Business Impact Analysis Executive Summary
Student Lab Manual
-46-
Laboratory #7
Lab #7: Perform a Business Impact Analysis for a Mock IT
Infrastructure
Learning Objectives and Outcomes
Upon completing this lab, students will be able to:
• Define the goal and objective of a Business Impact Analysis
(BIA)
• Identify where a Business Impact Analysis (BIA) fits within a
Business Continuity Plan (BCP)
• Identify mission critical applications and access to data
requirements for a given scenario
• Perform a Business Impact Analysis (BIA) utilizing a
qualitative assessment approach
• Create a Business Impact Analysis executive summary report
for management
Required Setup and Tools
This is a paper-based lab and does not require the use of a
“mock” IT infrastructure or virtualized server
farm.
The standard Instructor and Student VM workstation with
Microsoft Office 2007 or higher is required for
this lab. Students will need access to their completed, Lab #4 –
Assessment Worksheet, Part A – Perform
a Qualitative Risk Assessment for an IT Infrastructure
prioritizing the risks, threats, and vulnerabilities
identified from the qualitative risk assessment.
In addition, Microsoft Word is a required tool for the student to
craft a BIA utilizing a qualitative
assessment approach to prioritize mission critical applications,
data, and IT systems and elements that are
required to maintain business continuity. An executive summary
report is also required for management
along with answering and submitting the Lab #7 – Assessment
Worksheet questions.
Recommended Procedures
Lab #7 – Student Steps:
Student steps needed to perform Lab #7 - Perform a Business
Impact Analysis for an IT Infrastructure:
1. Connect your removable hard drive or USB hard drive to a
classroom workstation.
2. Boot up your classroom workstation and DHCP for an IP host
address.
3. Login to your classroom workstation and enable Microsoft
Word.
4. Review Figure 2 – “Mock” IT Infrastructure.
Student Lab Manual
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend
Learning Company Current Version Date: 05/30/2011
www.jblearning.com
All Rights Reserved.
-47-
5. Identify the scenario/vertical industry you were provided in
Lab #4 - assigned by your Instructor:
a. Healthcare provider under HIPPA compliance law
b. Regional bank under GLBA compliance law
c. Nationwide retailer under PCI DSS standard requirements
d. Higher-education institution under FERPA compliance law
6. Conduct a BIA by assigning a qualitative business impact
value for each identified business
functions and operations: Critical, Major, or Minor or None.
7. From this prioritization, identify the IT systems, applications,
and resources that are impacted.
8. Assess the recovery time objectives needed for the IT
systems, applications, and resources.
9. Complete Lab #7 – Assessment Worksheet, Part A – BIA
Process Flow Sheets and Part B –
Assessment Questions.
10. Craft a four-paragraph executive summary according to the
following outline:
a. Goals and purpose of the BIA – unique to your scenario
b. Summary of Findings – business functions and assessment
c. Prioritizations – critical, major, and minor classifications
d. IT systems and applications impacted - to support the defined
recovery time objectives
11. Work on Lab #7 – Assessment Worksheet and Questions and
submit with your executive
summary.
Deliverables
Upon completion of Lab #7 - Perform a Business Impact
Analysis for a Mock IT Infrastructure, students
are required to provide the following deliverables as part of this
lab:
1. Lab #7 – Assessment Worksheet, Part A - BIA of business
functions and operations
2. Lab #7 – Assessment Worksheet, Part B - Business Impact
Analysis Executive Summary
3. Lab #7 - Assessment Questions and Answers
Evaluation Criteria and Rubrics
The following are the evaluation criteria and rubrics for Lab #7
that the students must perform:
1. Was the student able to define the goal and objective of a
Business Impact Analysis (BIA)? –
[20%]
2. Was the student able to identify where a Business Impact
Analysis (BIA) fits within a Business
Continuity Plan (BCP)? – [20%]
Student Lab Manual
-48-
3. Was the student able to identify mission critical applications
and access to data requirements for a
given scenario? – [20%]
4. Was the student able to perform a Business Impact Analysis
(BIA) utilizing a qualitative
assessment approach? – [20%]
5. Was the student able to create a Business Impact Analysis
executive summary report for
management? – [20%]
Student Lab Manual
-49-
Lab #7: Assessment Worksheet
Part A – Perform a Business Impact Analysis for an IT
Infrastructure
Course Name:
_____________________________________________________
________
Student Name:
_____________________________________________________
________
Instructor Name:
_____________________________________________________
______
Lab Due Date:
_____________________________________________________
________
Overview
When performing a BIA, you are trying to assess and align the
affected IT systems, applications, and
resources to their required recovery time objectives (RTOs).
The prioritization of the identified mission
critical business functions will define what IT systems,
applications, and resources are impacted. The
RTO will drive what kind of business continuity and recovery
steps are needed to maintain IT operations
within the specified time frames.
1. Performa BIA assessment and fill in the following chart:
Business Function Business Impact Recovery
IT Systems/Apps
Or Process Factor Time
Objective Infrastructure Impacts
Internal and external voice
communications with
customers in real-time
Internal and external e-mail
communications with
customers via store and
forward messaging
DNS – for internal and
external IP communications
Internet connectivity for e-
mail and store and forward
customer service
Self-service website for
customer access to
information and personal
account information
Student Lab Manual
-50-
e-Commerce site for online
customer purchases or
scheduling 24x7x365
Payroll and human
resources for employees
Real-time customer service
via website, e-mail, or
telephone requires CRM
Network management and
technical support
Marketing and events
Sales orders or customer/
student registration
Remote branch office sales
order entry to headquarters
Voice and e-mail
communications to remote
branches
Accounting and finance
support: Accts payable,
Accts receivable, etc.
Part B – Craft a Business Impact Analysis Executive Summary
Craft a BIA executive summary, follow this structure and
format:
a. Goals and purpose of the BIA – unique to your scenario
b. Summary of Findings – business functions and assessment
c. Prioritizations – critical, major, and minor classifications
d. IT systems and applications impacted - to support the defined
recovery time objectives

More Related Content

Similar to Running head RISK ASSESSMENT 1RISK ASSESSMENT4.docx

8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 
Case StudyBy Templeofjava Studymode.com The Clarion Sch.docx
Case StudyBy Templeofjava  Studymode.com        The Clarion Sch.docxCase StudyBy Templeofjava  Studymode.com        The Clarion Sch.docx
Case StudyBy Templeofjava Studymode.com The Clarion Sch.docxtidwellveronique
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxmccormicknadine86
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentErik De Monte
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
Tackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risksTackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risksHarley Capewell
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxclarebernice
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Oracle
 
10 Easy Steps to Mastering Org Security
10 Easy Steps to Mastering Org Security10 Easy Steps to Mastering Org Security
10 Easy Steps to Mastering Org SecuritySalesforce Admins
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?guestc65425
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxketurahhazelhurst
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxwalterl4
 
COURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docxCOURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docxmarilucorr
 

Similar to Running head RISK ASSESSMENT 1RISK ASSESSMENT4.docx (17)

main project doument
main project doumentmain project doument
main project doument
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Case StudyBy Templeofjava Studymode.com The Clarion Sch.docx
Case StudyBy Templeofjava  Studymode.com        The Clarion Sch.docxCase StudyBy Templeofjava  Studymode.com        The Clarion Sch.docx
Case StudyBy Templeofjava Studymode.com The Clarion Sch.docx
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
Leveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk AssessmentLeveraging Technology and Analytics BSA Risk Assessment
Leveraging Technology and Analytics BSA Risk Assessment
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Tackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risksTackling the ticking time bomb – Data Migration and the hidden risks
Tackling the ticking time bomb – Data Migration and the hidden risks
 
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docxCMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
 
10 Easy Steps to Mastering Org Security
10 Easy Steps to Mastering Org Security10 Easy Steps to Mastering Org Security
10 Easy Steps to Mastering Org Security
 
Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?Business Mashups, or Mashup Business?
Business Mashups, or Mashup Business?
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
COURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docxCOURSE PROJECT2Operating System and Application Security Str.docx
COURSE PROJECT2Operating System and Application Security Str.docx
 

More from toltonkendal

Elementary CurriculaBoth articles highlight the fact that middle.docx
Elementary CurriculaBoth articles highlight the fact that middle.docxElementary CurriculaBoth articles highlight the fact that middle.docx
Elementary CurriculaBoth articles highlight the fact that middle.docxtoltonkendal
 
Elementary Statistics (MATH220)Assignment Statistic.docx
Elementary Statistics (MATH220)Assignment Statistic.docxElementary Statistics (MATH220)Assignment Statistic.docx
Elementary Statistics (MATH220)Assignment Statistic.docxtoltonkendal
 
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docx
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docxElements of Religious Traditions PaperWritea 700- to 1,050-word .docx
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docxtoltonkendal
 
Elements of MusicPitch- relative highness or lowness that we .docx
Elements of MusicPitch-  relative highness or lowness that we .docxElements of MusicPitch-  relative highness or lowness that we .docx
Elements of MusicPitch- relative highness or lowness that we .docxtoltonkendal
 
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docx
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docxElevated Blood Lead Levels in Children AssociatedWith the Fl.docx
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docxtoltonkendal
 
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docxElev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docxtoltonkendal
 
Elements of the Communication ProcessIn Chapter One, we learne.docx
Elements of the Communication ProcessIn Chapter One, we learne.docxElements of the Communication ProcessIn Chapter One, we learne.docx
Elements of the Communication ProcessIn Chapter One, we learne.docxtoltonkendal
 
Elements of Music #1 Handout1. Rhythm the flow of music in te.docx
Elements of Music #1 Handout1. Rhythm  the flow of music in te.docxElements of Music #1 Handout1. Rhythm  the flow of music in te.docx
Elements of Music #1 Handout1. Rhythm the flow of music in te.docxtoltonkendal
 
Elements of Music Report InstrumentsFor the assignment on the el.docx
Elements of Music Report InstrumentsFor the assignment on the el.docxElements of Music Report InstrumentsFor the assignment on the el.docx
Elements of Music Report InstrumentsFor the assignment on the el.docxtoltonkendal
 
Elements of GenreAfter watching three of the five .docx
Elements of GenreAfter watching three of the five .docxElements of GenreAfter watching three of the five .docx
Elements of GenreAfter watching three of the five .docxtoltonkendal
 
Elements of DesignDuring the process of envisioning and designing .docx
Elements of DesignDuring the process of envisioning and designing .docxElements of DesignDuring the process of envisioning and designing .docx
Elements of DesignDuring the process of envisioning and designing .docxtoltonkendal
 
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docxElements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docxtoltonkendal
 
Elements of DesignDuring the process of envisioning and design.docx
Elements of DesignDuring the process of envisioning and design.docxElements of DesignDuring the process of envisioning and design.docx
Elements of DesignDuring the process of envisioning and design.docxtoltonkendal
 
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docxElements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docxtoltonkendal
 
Elements for analyzing mise en sceneIdentify the components of.docx
Elements for analyzing mise en sceneIdentify the components of.docxElements for analyzing mise en sceneIdentify the components of.docx
Elements for analyzing mise en sceneIdentify the components of.docxtoltonkendal
 
Elements in the same row have the same number of () levelsWhi.docx
Elements in the same row have the same number of () levelsWhi.docxElements in the same row have the same number of () levelsWhi.docx
Elements in the same row have the same number of () levelsWhi.docxtoltonkendal
 
ELEG 421 Control Systems Transient and Steady State .docx
ELEG 421 Control Systems  Transient and Steady State .docxELEG 421 Control Systems  Transient and Steady State .docx
ELEG 421 Control Systems Transient and Steady State .docxtoltonkendal
 
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docxElement 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docxtoltonkendal
 
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docxELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docxtoltonkendal
 
Electronic Media PresentationChoose two of the following.docx
Electronic Media PresentationChoose two of the following.docxElectronic Media PresentationChoose two of the following.docx
Electronic Media PresentationChoose two of the following.docxtoltonkendal
 

More from toltonkendal (20)

Elementary CurriculaBoth articles highlight the fact that middle.docx
Elementary CurriculaBoth articles highlight the fact that middle.docxElementary CurriculaBoth articles highlight the fact that middle.docx
Elementary CurriculaBoth articles highlight the fact that middle.docx
 
Elementary Statistics (MATH220)Assignment Statistic.docx
Elementary Statistics (MATH220)Assignment Statistic.docxElementary Statistics (MATH220)Assignment Statistic.docx
Elementary Statistics (MATH220)Assignment Statistic.docx
 
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docx
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docxElements of Religious Traditions PaperWritea 700- to 1,050-word .docx
Elements of Religious Traditions PaperWritea 700- to 1,050-word .docx
 
Elements of MusicPitch- relative highness or lowness that we .docx
Elements of MusicPitch-  relative highness or lowness that we .docxElements of MusicPitch-  relative highness or lowness that we .docx
Elements of MusicPitch- relative highness or lowness that we .docx
 
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docx
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docxElevated Blood Lead Levels in Children AssociatedWith the Fl.docx
Elevated Blood Lead Levels in Children AssociatedWith the Fl.docx
 
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docxElev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
Elev ent h EDIT IONREAL ESTATE PRINCIPLESCHARLES F. .docx
 
Elements of the Communication ProcessIn Chapter One, we learne.docx
Elements of the Communication ProcessIn Chapter One, we learne.docxElements of the Communication ProcessIn Chapter One, we learne.docx
Elements of the Communication ProcessIn Chapter One, we learne.docx
 
Elements of Music #1 Handout1. Rhythm the flow of music in te.docx
Elements of Music #1 Handout1. Rhythm  the flow of music in te.docxElements of Music #1 Handout1. Rhythm  the flow of music in te.docx
Elements of Music #1 Handout1. Rhythm the flow of music in te.docx
 
Elements of Music Report InstrumentsFor the assignment on the el.docx
Elements of Music Report InstrumentsFor the assignment on the el.docxElements of Music Report InstrumentsFor the assignment on the el.docx
Elements of Music Report InstrumentsFor the assignment on the el.docx
 
Elements of GenreAfter watching three of the five .docx
Elements of GenreAfter watching three of the five .docxElements of GenreAfter watching three of the five .docx
Elements of GenreAfter watching three of the five .docx
 
Elements of DesignDuring the process of envisioning and designing .docx
Elements of DesignDuring the process of envisioning and designing .docxElements of DesignDuring the process of envisioning and designing .docx
Elements of DesignDuring the process of envisioning and designing .docx
 
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docxElements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
Elements of Critical Thinking [WLOs 2, 3, 4] [CLOs 2, 3, 4]P.docx
 
Elements of DesignDuring the process of envisioning and design.docx
Elements of DesignDuring the process of envisioning and design.docxElements of DesignDuring the process of envisioning and design.docx
Elements of DesignDuring the process of envisioning and design.docx
 
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docxElements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
Elements of a contact due 16 OctRead the Case Campbell Soup Co. v..docx
 
Elements for analyzing mise en sceneIdentify the components of.docx
Elements for analyzing mise en sceneIdentify the components of.docxElements for analyzing mise en sceneIdentify the components of.docx
Elements for analyzing mise en sceneIdentify the components of.docx
 
Elements in the same row have the same number of () levelsWhi.docx
Elements in the same row have the same number of () levelsWhi.docxElements in the same row have the same number of () levelsWhi.docx
Elements in the same row have the same number of () levelsWhi.docx
 
ELEG 421 Control Systems Transient and Steady State .docx
ELEG 421 Control Systems  Transient and Steady State .docxELEG 421 Control Systems  Transient and Steady State .docx
ELEG 421 Control Systems Transient and Steady State .docx
 
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docxElement 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
Element 010 ASSIGNMENT 3000 WORDS (100)Task Individual assign.docx
 
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docxELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
ELEG 320L – Signals & Systems Laboratory Dr. Jibran Khan Yous.docx
 
Electronic Media PresentationChoose two of the following.docx
Electronic Media PresentationChoose two of the following.docxElectronic Media PresentationChoose two of the following.docx
Electronic Media PresentationChoose two of the following.docx
 

Recently uploaded

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 

Recently uploaded (20)

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Running head RISK ASSESSMENT 1RISK ASSESSMENT4.docx

  • 1. Running head: RISK ASSESSMENT 1 RISK ASSESSMENT 4 Case Study Phase 1 Name Class Instructor Date Risk is defined as the possibility of a threat to exploit vulnerabilities which are found within information systems to cause harm and compromise data. Risk occurs in different types and they affect information systems differently depending on the vulnerability being exploited and there intended faction. Risks in the industry financial sector in firms, such as Wells Fargo, are associated with the loose of client information, loss of financial proprietary information as well as the risk of fraud when their information systems platform gets hacked. For
  • 2. the research, risk on client information will be in focus as it is the most prominent form of risks that various financial firm face (McLaughlin, 2018). Risk towards client details occurs in the form of hackers, a systems glitch which leads to clients having a slow time accessing their funds and compromising of client information which can mismatch of vital client information leading to loses to the company. Information and technology is an important aspect of Wells Fargo operations since it keeps all the records of its clients and tracking various transactions that the company makes with different stakeholders. One of the risks that the company faces is human error, since its employees are in charge of ensuring they key in the right information, every now and then, employees might key in the wrong information for a client and this can lead to the company information systems holding the wrong information pertaining to different clients. This makes it easier for people to commit fraud and embezzle funds from the bank (Willcocks, 2013). Wells Fargo being a financial institution is repeatedly under threat by hackers and people trying to amend their financial situations which means that they need to ensure that their financial systems are safe and have no risks which can be exploited by any party. Being that the Wells Fargo is a major credit company, the company risks the loss of its client’s data if it happens to be hacked and also when clients provide their private information to fraudsters who use the information to conduct credit card fraud where they open up credit cards and lines using the client’s name. In the recent past, Wells Fargo has been accused of opening up accounts for its clients without their consent which is major personnel risk which the firm used to increase their revenues but in the process ended up losing revenues through court fines and a reduction of its brand market worth. Information systems face internals risks as highlighted by this move and having information systems which would warn employees and the managers of the firm of various ethical
  • 3. violations would have helped the company to maintain its brand's and save revenue which it used to pay court fines and damages (McLaughlin, 2018). Wells Fargo as a firm, uses various algorithms to invest in different projects to generate more revenue. The company faces risk as the client's funds are used to invest in the projects to ensure that the firm is able to cater for its operational costs. Since the algorithm is based on the internet, it can get attacked by different malware which would affect its performance giving the wrong results (Willcocks, 2013). The wrong results will mean that the company will be investing in projects which will not achieve the expected return and this puts the client’s finances at risk. The risks are experienced by multiple financial firms which lead to the firms investing in more modern and updated systems which have been tested to have fewer bugs and to have fewer risks compared to the prevailing information systems. The financial industry tends to stay ahead of the market by investing and acquiring new technology to ensure that it does not comprised and the vulnerabilities are easily fixed since it is the financier of most economies. References McLaughlin, T. (2018, February 01). Wells Fargo loses big client after dialing up risk in retirement funds. Retrieved March 30, 2018, from https://www.reuters.com/article/us-wellsfargo- funds-texas/wells-fargo-loses-big-client-after-dialing-up-risk- in-retirement-funds-idUSKBN1FL5L5 Willcocks, L. (2013). Information management: the evaluation of information systems investments. Springer. Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: principles and practice. Pearson Education.
  • 4. Module 5 Assignments For this module you are required to complete the following assignments: · Chapter 9: exercises # 2 - 7 2. State three advantages of an Ethernet-based metropolitan area network over a SONET-based metropolitan area network. 3. Which type of network application requires more elaborate software: connection-oriented or connectionless? Explain. 4. Create an analogy similar to the telephone call/sending-a- letter scenarios that demonstrates the differences between connection-oriented and connectionless network applications. 5. Explain the difference between a network node and a network station. 6. Does a datagram network require any setup time before a packet is transmitted? If so, when and how often? 7. Does a virtual circuit network require any setup time before a packet is transmitted? If so, when and how often? Thinking Outside the Box #4 One form of congestion avoidance is the permit system, in which a node must have a permit before it can transmit. Suppose a wide area network is using a permit system to control
  • 5. suggestion. What happens if, for some unknown reason, all the permits disappear? How can this event be detected? How can this event be repaired? For this lab, you are completing a BIA for a company or organization. The lab provides a list of companies/organizations to choose from, which are listed below. However, I prefer for students to complete the lab assignment based upon the topic of choice for the case study (Wells Fargo was the topic I chose, it is attached). So, if Bank of America is the topic of your case study, then you would complete a BIA for BOA. You are to complete the table provided in Part A of the lab assignment. The far left column contains business functions that may or may not apply to the company/organization. You will determine this. You will rate the criticality of the business function to the company or organization and the applicable RTO for that business function. You will then state how an interruption would impact the IT infrastructure, which is the far right column. For example, what impact would a disruption have within a company if that function is not restored in a particular time? After completion of the table, you will then provide an executive summary of the table to present to upper management. This is part B of the assignment. Part A is completion of the table provided in Part A and Part B is the executive summary. BIA Lab Options or you can use the topic of the case study (Wells Fargo). a. Healthcare provider under HIPAA compliance law b. Regional bank under GLBA compliance law c. Nationwide retailer under PCI DSS standard requirements d. Higher-education institution under FERPA compliance law Complete the Deliverables as assigned below.
  • 6. Do Complete 1. Lab #7 – Assessment Worksheet, Part A - BIA of business functions and operations2. Lab #7 – Assessment Worksheet, Part B - Business Impact Analysis Executive Summary Student Lab Manual -46- Laboratory #7 Lab #7: Perform a Business Impact Analysis for a Mock IT Infrastructure Learning Objectives and Outcomes Upon completing this lab, students will be able to: • Define the goal and objective of a Business Impact Analysis (BIA) • Identify where a Business Impact Analysis (BIA) fits within a Business Continuity Plan (BCP) • Identify mission critical applications and access to data requirements for a given scenario
  • 7. • Perform a Business Impact Analysis (BIA) utilizing a qualitative assessment approach • Create a Business Impact Analysis executive summary report for management Required Setup and Tools This is a paper-based lab and does not require the use of a “mock” IT infrastructure or virtualized server farm. The standard Instructor and Student VM workstation with Microsoft Office 2007 or higher is required for this lab. Students will need access to their completed, Lab #4 – Assessment Worksheet, Part A – Perform a Qualitative Risk Assessment for an IT Infrastructure prioritizing the risks, threats, and vulnerabilities identified from the qualitative risk assessment. In addition, Microsoft Word is a required tool for the student to craft a BIA utilizing a qualitative assessment approach to prioritize mission critical applications, data, and IT systems and elements that are
  • 8. required to maintain business continuity. An executive summary report is also required for management along with answering and submitting the Lab #7 – Assessment Worksheet questions. Recommended Procedures Lab #7 – Student Steps: Student steps needed to perform Lab #7 - Perform a Business Impact Analysis for an IT Infrastructure: 1. Connect your removable hard drive or USB hard drive to a classroom workstation. 2. Boot up your classroom workstation and DHCP for an IP host address. 3. Login to your classroom workstation and enable Microsoft Word. 4. Review Figure 2 – “Mock” IT Infrastructure. Student Lab Manual Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
  • 9. www.jblearning.com All Rights Reserved. -47- 5. Identify the scenario/vertical industry you were provided in Lab #4 - assigned by your Instructor: a. Healthcare provider under HIPPA compliance law b. Regional bank under GLBA compliance law c. Nationwide retailer under PCI DSS standard requirements d. Higher-education institution under FERPA compliance law 6. Conduct a BIA by assigning a qualitative business impact value for each identified business functions and operations: Critical, Major, or Minor or None. 7. From this prioritization, identify the IT systems, applications, and resources that are impacted. 8. Assess the recovery time objectives needed for the IT systems, applications, and resources. 9. Complete Lab #7 – Assessment Worksheet, Part A – BIA Process Flow Sheets and Part B – Assessment Questions. 10. Craft a four-paragraph executive summary according to the following outline: a. Goals and purpose of the BIA – unique to your scenario
  • 10. b. Summary of Findings – business functions and assessment c. Prioritizations – critical, major, and minor classifications d. IT systems and applications impacted - to support the defined recovery time objectives 11. Work on Lab #7 – Assessment Worksheet and Questions and submit with your executive summary. Deliverables Upon completion of Lab #7 - Perform a Business Impact Analysis for a Mock IT Infrastructure, students are required to provide the following deliverables as part of this lab: 1. Lab #7 – Assessment Worksheet, Part A - BIA of business functions and operations 2. Lab #7 – Assessment Worksheet, Part B - Business Impact Analysis Executive Summary 3. Lab #7 - Assessment Questions and Answers Evaluation Criteria and Rubrics The following are the evaluation criteria and rubrics for Lab #7 that the students must perform: 1. Was the student able to define the goal and objective of a
  • 11. Business Impact Analysis (BIA)? – [20%] 2. Was the student able to identify where a Business Impact Analysis (BIA) fits within a Business Continuity Plan (BCP)? – [20%] Student Lab Manual -48- 3. Was the student able to identify mission critical applications and access to data requirements for a given scenario? – [20%] 4. Was the student able to perform a Business Impact Analysis (BIA) utilizing a qualitative assessment approach? – [20%] 5. Was the student able to create a Business Impact Analysis executive summary report for management? – [20%]
  • 12. Student Lab Manual -49- Lab #7: Assessment Worksheet Part A – Perform a Business Impact Analysis for an IT Infrastructure Course Name: _____________________________________________________ ________ Student Name: _____________________________________________________ ________ Instructor Name: _____________________________________________________ ______ Lab Due Date:
  • 13. _____________________________________________________ ________ Overview When performing a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The prioritization of the identified mission critical business functions will define what IT systems, applications, and resources are impacted. The RTO will drive what kind of business continuity and recovery steps are needed to maintain IT operations within the specified time frames. 1. Performa BIA assessment and fill in the following chart: Business Function Business Impact Recovery IT Systems/Apps Or Process Factor Time Objective Infrastructure Impacts Internal and external voice communications with customers in real-time Internal and external e-mail communications with customers via store and
  • 14. forward messaging DNS – for internal and external IP communications Internet connectivity for e- mail and store and forward customer service Self-service website for customer access to information and personal account information Student Lab Manual -50- e-Commerce site for online customer purchases or scheduling 24x7x365
  • 15. Payroll and human resources for employees Real-time customer service via website, e-mail, or telephone requires CRM Network management and technical support Marketing and events Sales orders or customer/ student registration Remote branch office sales order entry to headquarters Voice and e-mail communications to remote branches Accounting and finance support: Accts payable, Accts receivable, etc. Part B – Craft a Business Impact Analysis Executive Summary
  • 16. Craft a BIA executive summary, follow this structure and format: a. Goals and purpose of the BIA – unique to your scenario b. Summary of Findings – business functions and assessment c. Prioritizations – critical, major, and minor classifications d. IT systems and applications impacted - to support the defined recovery time objectives