Overview For this Performance Task Assessment, you will examine a real-world bus

by | Mar 18, 2022 | Business and Management

Overview
For this Performance Task Assessment, you will examine a real-world business case to identify and evaluate potential cybersecurity risks. Based on the results of that evaluation, you will choose risk control strategies for business continuity and disaster recovery.
Assessment Submission Length: 11- to 15-slide PowerPoint presentation, with accompanying script.
Instructions
To complete this Assessment, do the following:
Read and review the following case studies:
Hui, K. L., Huang, M., Ke, P. F., & Lai, A. (2016). Case: PopVote: Assessing the Risk of DDoS (A). Thompson Center for Business Case Studies.
Hui, K. L., Huang, M., Ke, P. F., & Lai, A. (2016). Supplement: PopVote: Assessing the Risk of DDoS (B). Thompson Center for Business Case Studies.
Supporting Business Continuity Through IT
For this Performance Task Assessment, you will act as a consultant hired by a small organization to develop a presentation on supporting business continuity while considering ethics, privacy concerns, and security risks. The organization requested that you base your presentation on a particular case that they have identified. This case is based on a real-world situation where the electronic voting system used by the Public Opinion Programme (POP) at the University of Hong Kong was under serious distributed denial of service (DDoS) attacks. In this series of case studies (A and B), you will be given the opportunity to practice identifying and assessing potential cybersecurity risks and choose risk control strategies for business continuity and disaster recovery.
This case study consists of cases A and B. Case A gives the background on POP and PopVote and allows you to explore how to identify and assess potential security risks. Case B sets the scene for risk control in information security management. It describes some unexpected situations where management will need to make immediate decisions on what they should do to control the risks.
You will prepare an 11- to 15-slide presentation (excluding title slide and reference slide). You must also provide an accompanying document that contains detailed speaker notes or a script for each slide so that the reader can follow along better. Your speaker notes should include your rationale and assumptions that pertain to your slide. You also need to have a minimum of 6–8 citations and references to support your direction. Note: You may elect to include additional slides as part of an appendix if you have information you might reasonably assume that a CEO or upper management might want. It is not required that you do so.
Part 1: Identify and Evaluate Cybersecurity Risks (approximately 6–8 slides)
Explain, in general terms, what are common types of cybersecurity risks to organizations. (1 slide)
Identify possible impacts of cybersecurity risks on an organization. (1 slide)
Examine the potential ethical and privacy concerns of managing data within an organization. (1–2 slides)
Rank the vulnerabilities of PopVote, the electronic voting system, in terms of impact (financial or otherwise) to the organization. (In your speaker notes document, be sure to provide rationale for your rankings.) (1 slide)
Identify what the Public Opinion Programme (POP) did to mitigate risks before the New Year vote in 2014. (1 slide)
Evaluate the strengths and weaknesses of POP’s risk mitigation plan before the New Year vote in 2014. (1–2 slides)
Part 2: Risk Control Strategies for Business Continuity and Disaster Recovery (approximately 5–7 slides)
Explain, in general terms, what business continuity planning is and what is the role of IT in business continuity planning and management. (1 slide)
Evaluate the strengths and weaknesses of outsourcing risk control and business continuity management to a cloud service provider. (1–2 slides)
Identify three risk control options and assess the strengths and weaknesses of each. (2–3 slides)
Choose the best-fit risk control strategy for ensuring business continuity as well as disaster recovery, data privacy, and ethics. (1 slide)
-use real life examples, check all the requirements by the RUBRIC file, APA formatted citations, use outlines for the power presentation

Do you need any assistance with this question?
Send us your paper details now
We'll find the best professional writer for you!