In the below attachment, here is a data model on employees savings funds. For this data model , copy and paste that data model graphic into a MS Word document. In your MS Word document, 1) identify the entity or entities that represent a supertype and the entities that are subtypes, 2) specify which attributes the subtypes inherit from the supertype(s), 3) specify which attributes are unique to each subtype.
Submit your MS word document. Thank you
During this assignment, you will conduct a full risk assessment against the same corporate profile selected earlier. Based on the information obtained from previous assignments, provide a synopsis on how to manage identified risks, and describe the tools and strategies that will ensure network security.
Prerequisite: Using a vulnerability scanner obtained for the previous assignment, conduct a full scan against all servers in the domain. (This information will be used in Part 3 of the assignment.)
Use the following guidelines to create a four to five-page report.
Part 1: Prepare for Risk Management (“Establish a Framework for Managing Risk”)
List the corporate requirements (i.e., standards, laws) associated with the company. Briefly explain the impact of non-compliance.
Develop categories and a classification method for company information systems. List at least eight categories for various people, processes, hardware, software, and data applicable to the company. Describe the data/system classification scheme as well as the reasons for selecting it.
Part 2: Identify Risk (“Where is the Risk to My Information Assets”)
List a minimum of 20 assets (data, systems, people, processes, etc.) and measure their value to the company (Low, Moderate, High, Critical) in a simple table.
In one column, identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity (i.e., Business Impact Analysis).
Part 3: Assess Risk (“How Severe is the Risk to My Information Assets”)
Identify, measure (quantitative and qualitative), and mitigate key information technology risks. In addition, describe each of the tasks associated with risk framing, assessment, response and monitoring. Refer to risk models (e.g., NIST SP 800-39 Managing Information Security Risk).
Select the optimal risk assessment methodology based on corporate needs. Compare the advantages/disadvantages of your selected risk assessment methodology to others used in the industry.
Provide a diagram of the matrix that was used to assess risk.
Define for each asset the potential threats, the likelihood the threat will occur or be successful, and the impact loss the asset will have on the company (Risk Mitigation Economics). Note: This includes disasters, loss of power, employee resignations, system malfunctions, drop-in customers, etc.
Using the vulnerability scan, list in a table a minimum of 15 identified threats (open vulnerabilities) to the information systems, the impact of the exploited vulnerability, and remediation steps (countermeasures) to remove or reduce either impact or likelihood from threat.
Part 4: Define Risk Appetite (“How Much Risk is Acceptable to My Organization”)
Review the characteristics of a risk appetite within Chapter 6 of the course text.
Establish a Risk Appetite Statement for the company.
Define the Risk Tolerance of the company.
Part 5: Control Risk
In 300–500 words, identify and describe the Risk Control Strategy adopted by the company. Ensure the strategy is in alignment with corporate requirements (standards, laws, frameworks, security policies, etc.) and risk appetite.
Create a quality digital presentation with no more than 12 slides (including detailed speaker notes for all) that describes the dynamic system, the Causal loop diagram, and the rationale for each assumption. Each presentation will be turned in individually and should include the following: A clear definition/introduction of the dynamic system
Causal loop diagram modeling the relationships between factors in the dynamic system.
Dynamic system model that is appropriate for the system
Use MS Excel to construct and run a model simulation. The simulation will require finding relevant data to be used in the model.
Three output graphs that display three possible outcomes from the system. For example: equilibrium and imbalance that favors one of the factors over the other.
A description of the limitations of your model, and how you could improve it
Explain why this clear explanation of the model and assumptions is needed to provide an ethical representation of the data
Please follow the instructions in the attachment to complete it
Please refrain from using any sources. No sources required. This is for a college
Please refrain from using any sources. No sources required. This is for a college admissions essay for engineering on computer science and cybersecurity. It is important to make this appealing and personable with a good story. I have always enjoyed taking apart electronics and computers to fix them and see what makes them work.[supanova_question]