preview

M4 Risk Assessment

Decent Essays

Based on the organization you have chosen for your final research paper:
Business Case: Provide details about the organization you have chosen for your scenario and relevant information about their
1. Organizational Structure As of 2014 the United States had total population of 318 million and 277 million Internet users (United States Internet Usage, Broadband and Telecommunications Reports – Statistics, 2014). Most large communications companies have their own devoted backbones linking numerous areas (Tyson, 2001). In each area, the company has a Point of Presence (POP), which is a locality for local users to access the provider’s network, usually via a local phone number or dedicated line (Tyson, 2001). The amazing thing here is that there is …show more content…

Current State of Security that motivates your project (if your project is in response to new risk introduced by another initiative in the organization, then explain the business case that is motivating your project in response). This section will be supplemented by your risk assessment in M4. If your project is because of gaps that introduce risk in your current environment, provide a business case for why there are gaps and how your project is needed to address those gaps. It is likely that something happened over time to get to the state you have today (it could be evolving technology, increased business demands, etc.) When all is said and done, the United States Internet is fully exposed to any threat from outside the country’s borders. What security that exists relies solely on independent security methods, be them from the United States government, from private companies, or just individuals. As has been noted recently, all these have failed miserably, be it China’s stealing of millions of records from the United States Office of Personnel Management (Gertz, 2016), January, to the Sony hack by the North Korean’s (Elkind, 2015) and have demonstrated the total lack of needed national Internet boundary

Get Access