Your Perfect Assignment is Just a Click Away

Starting at $8.00 per Page

100% Original, Plagiarism Free, Customized to Your instructions!

glass
pen
clip
papers
heaphones

University of Nebraska at Omaha Personal Technology Risk Assessment Discussion

University of Nebraska at Omaha Personal Technology Risk Assessment Discussion

Question Description


please refer to the first link for the risk framework you have to use(https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistsp…)

And please refer to this link for the risk assessmnet structure(https://unomaha.instructure.com/courses/46791/file…)

Overview

In today’s world, you are surrounded by technology at school, work, home and even on the go. Have you ever thought about the risks you face from your use of technology and how you could/should implement solutions to reduce your greatest risks?


Task

Your assignment is to perform a cybersecurity risk assessment of yourself–of your personal exposure to technology (hint…not just devices). For this assignment, I recommend you use a risk framework, such as risk scenario as discussed in our readings. Another framework to use could be the NIST Cybersecurity Risk Assessment Process (Links to an external site.) (NIST 800-30r1).

Your paper should be 4-5 pages and use the formatting guidelines described in Module 1. Your assessment can include diagrams and or risk matrix charts to help explain the findings, but should not be considered part of the 4-5 pages. Please refer to the Personal Technology Risk Assessment Template to structure your paper. Use this as an outline for your paper.

Your paper should include the following elements:

Part 1 (25 points)

  • The first step is to establish what is in scope for the security assessment; an inventory of your personal technology footprint. What technology do you use in your life? Please do not include any personal or confidential information in this inventory
  • Definition and documentation of your personal risk appetite

Part 2 (50 points)

  • Identify threat sources that are relevant to your personal technology use
  • Identify threat events that could be produced by those sources
  • Identify vulnerabilities within your personal technology footprint that could be exploited by threat sources through specific threat events
  • Determine the likelihood that the identified threat sources would cause specific threat events and the likelihood that the threat events would be successful
  • Determine the adverse impacts to you resulting from the exploitation of vulnerabilities by threat sources (through specific threat events)
  • Determine information security risks as a combination of likelihood of threat exploitation of vulnerabilities and the impact of such exploitation

Part 3 (25 points)

  • Identification of at least three improvements you would recommend for your personal technology use based on the risk assessment you performed and why you chose these three improvements.

Submit Assignment

Once you have completed this assignment, follow the steps below to submit your assignment.

  1. Click the Submit Assignment button on the right sidebar to open the assignment.
  2. Upload your document.
  3. Please use the comment box if you want to ask any questions or make any comments about this assignment.
  4. Click the Submit button.

Rubric

Personal Technology Risk Assessment

Personal Technology Risk Assessment

Criteria Ratings Pts

This criterion is linked to a Learning OutcomeDescribes a sufficient, if not complete, inventory of your personal technology footprintPlease do not include any personal or confidential information in this inventory

15 pts

This criterion is linked to a Learning OutcomeDefines and documents personal risk appetite

10 pts

This criterion is linked to a Learning OutcomeIdentifies threat sources and threat events

10 pts

This criterion is linked to a Learning OutcomeIdentifies exploitable vulnerabilitiesIdentify vulnerabilities within your personal technology footprint that could be exploited by threat sources through specific threat events

10 pts

This criterion is linked to a Learning OutcomeLikelihood of successful threat events describesDetermine the likelihood that the identified threat sources would cause specific threat events and the likelihood that the threat events would be successful

10 pts

This criterion is linked to a Learning OutcomeProvides potential adverse impacts of threat eventDetermine the adverse impacts to you resulting from the exploitation of vulnerabilities by threat sources (through specific threat events)

10 pts

This criterion is linked to a Learning OutcomeDescribes risks of threat events as combination of likelihood and impactDetermine information security risks as a combination of likelihood of threat exploitation of vulnerabilities and the impact of such exploitation

10 pts

This criterion is linked to a Learning OutcomeDescribes recommended improvements and whyIdentification of at least three improvements you would recommend for your personal technology use based on the risk assessment you performed and why you chose these three improvements

25 pts

Total Points: 100

Paper Formatting Requirements

Format

  • All assignments should be printed and turned in at the beginning of class.
  • If you miss class and have to email or submit the assignment through Canvas, that is acceptable.
  • Most assignments need should be written using MS Word or Excel. Assignments can be submitted one of the following file formats: .doc, .docx, .xls, .xlsx or PDF.
  • Do not submit html files, web pages, CAD files, Visio (.vsd),etc.

Fonts

  • Use a clear, readable, sans serif font such as Verdana, Calibri, Tahoma or Arial, and be consistent and use the same font throughout.
  • Use black text on a white background.
  • Use 11 point for the body of your assignment.

Spacing

  • Use 1.5 spacing throughout your paper. Do not leave excessive spacing between headings, sections or paragraphs.Your margins should be no more than 1” and no less than .75”. You can leverage MS Word’s margins function and use Normal or Moderate.

Headings

  • Use bold for headings. Not underlining or italics.
  • Essays do not usually require subheadings; reports usually do.

Title Page

Most assignments require a title page, which should include the following:

  • the title and number of the assignment
  • the course number and name
  • the due date
  • your full name.

This information should be centered, starting approximately one third of the way down the page.


Numbering

  • Number all pages except the title page.
  • Tables and figures must be numbered and clearly labelled. Table captions are placed above the table, while captions for a figures go below the figure.
  • Don’t number the items in a reference list.

Headers and Footers

Insert a header or footer on each page (except the title page). It should contain:

  • your name (last name, first name/s)
  • the page number.

Reference List

The reference list comes at the end of the assignment, and should start on a new page labelled ‘References’. Remember to cite your sources


Appendices

Appendices are used for information that:

  • is too long to include in the body of your assignment, or
  • supplements or complements the information you are providing.

Start each appendix (if applicable) on a new page. If there’s just one appendix label it ‘Appendix’ without a number, but if there are more than one label them Appendix A, Appendix B, etc. In the main text of your assignment, refer to the Appendix by the label, e.g. Appendix A.


Tops and Bottoms of Pages

Check the top and bottom of your pages to ensure they avoid:

  • widows – single lines of text at the top of a page
  • orphans – first lines of paragraphs at the bottom of a page
  • tombstones – headings or subheadings alone at the bottom of a page
  • split lists – lists that are divided between two pages (if possible).


"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.