### ** ** ### **please refer to the first link for the risk framework you have to use(https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistsp…)** **And please refer to this link for the risk assessmnet structure(https://unomaha.instructure.com/courses/46791/file…**) ### **Overview** In today’s world, you are surrounded by technology at school, work, home and even on the go. Have you ever thought about the risks you face from your use of technology and how you could/should implement solutions to reduce your greatest risks? * * * ### **Task** Your assignment is to perform a **_cybersecurity_** risk assessment of yourself–of your personal exposure to technology (hint…not just devices). For this assignment, I recommend you use a risk framework, such as risk scenario as discussed in our readings. Another framework to use could be the NIST Cybersecurity Risk Assessment Process (Links to an external site.) (NIST 800-30r1). Your paper should be 4-5 pages and use the formatting guidelines described in Module 1. Your assessment can include diagrams and or risk matrix charts to help explain the findings, but should not be considered part of the 4-5 pages. Please refer to the Personal Technology Risk Assessment Template to structure your paper. Use this as an outline for your paper. Your paper should include the following elements: **Part 1 (25 points)** * The first step is to establish what is in scope for the security assessment; an inventory of your personal technology footprint. What technology do you use in your life? **_Please do not include any personal or confidential information in this inventory_** * Definition and documentation of your personal risk appetite **Part 2 (50 points)** * Identify threat sources that are relevant to your personal technology use * Identify threat events that could be produced by those sources * Identify vulnerabilities within your personal technology footprint that could be exploited by threat sources through specific threat events * Determine the likelihood that the identified threat sources would cause specific threat events and the likelihood that the threat events would be successful * Determine the adverse impacts to you resulting from the exploitation of vulnerabilities by threat sources (through specific threat events) * Determine information security risks as a combination of likelihood of threat exploitation of vulnerabilities and the impact of such exploitation **Part 3 (25 points)** * Identification of at least three improvements you would recommend for your personal technology use based on the risk assessment you performed and why you chose these three improvements. * * * ### **Submit Assignment** Once you have completed this assignment, follow the steps below to submit your assignment. 1. Click the **Submit Assignment** button on the right sidebar to open the assignment. 2. Upload your document. 3. Please use the comment box if you want to ask any questions or make any comments about this assignment. 4. Click the **Submit** button. ## Rubric Personal Technology Risk Assessment Personal Technology Risk Assessment Criteria| Ratings| Pts —|—|— This criterion is linked to a Learning OutcomeDescribes a sufficient, if not complete, inventory of your personal technology footprintPlease do not include any personal or confidential information in this inventory | | 15 pts This criterion is linked to a Learning OutcomeDefines and documents personal risk appetite | | 10 pts This criterion is linked to a Learning OutcomeIdentifies threat sources and threat events | | 10 pts This criterion is linked to a Learning OutcomeIdentifies exploitable vulnerabilitiesIdentify vulnerabilities within your personal technology footprint that could be exploited by threat sources through specific threat events | | 10 pts This criterion is linked to a Learning OutcomeLikelihood of successful threat events describesDetermine the likelihood that the identified threat sources would cause specific threat events and the likelihood that the threat events would be successful | | 10 pts This criterion is linked to a Learning OutcomeProvides potential adverse impacts of threat eventDetermine the adverse impacts to you resulting from the exploitation of vulnerabilities by threat sources (through specific threat events) | | 10 pts This criterion is linked to a Learning OutcomeDescribes risks of threat events as combination of likelihood and impactDetermine information security risks as a combination of likelihood of threat exploitation of vulnerabilities and the impact of such exploitation | | 10 pts This criterion is linked to a Learning OutcomeDescribes recommended improvements and whyIdentification of at least three improvements you would recommend for your personal technology use based on the risk assessment you performed and why you chose these three improvements | | 25 pts Total Points: 100 # Paper Formatting Requirements ### **Format** * All assignments should be printed and turned in at the beginning of class. * If you miss class and have to email or submit the assignment through Canvas, that is acceptable. * Most assignments need should be written using MS Word or Excel. Assignments can be submitted one of the following file formats: .doc, .docx, .xls, .xlsx or PDF. * Do not submit html files, web pages, CAD files, Visio (.vsd),etc. * * * ### **Fonts** * Use a clear, readable, sans serif font such as Verdana, Calibri, Tahoma or Arial, and be consistent and use the same font throughout. * Use black text on a white background. * Use 11 point for the body of your assignment. * * * ### **Spacing** * Use 1.5 spacing throughout your paper. Do not leave excessive spacing between headings, sections or paragraphs.Your margins should be no more than 1” and no less than .75”. You can leverage MS Word’s margins function and use Normal or Moderate. * * * ### **Headings** * Use bold for headings. Not underlining or italics. * Essays do not usually require subheadings; reports usually do. * * * ### **Title Page** Most assignments require a title page, which should include the following: * the title and number of the assignment * the course number and name * the due date * your full name. This information should be centered, starting approximately one third of the way down the page. * * * ### **Numbering** * Number all pages except the title page. * Tables and figures must be numbered and clearly labelled. Table captions are placed above the table, while captions for a figures go below the figure. * Don’t number the items in a reference list. * * * ### **Headers and Footers** Insert a header or footer on each page (except the title page). It should contain: * your name (last name, first name/s) * the page number. * * * ### **Reference List** The reference list comes at the end of the assignment, and should start on a new page labelled ‘References’. Remember to cite your sources * * * ### **Appendices** Appendices are used for information that: * is too long to include in the body of your assignment, or * supplements or complements the information you are providing. Start each appendix (if applicable) on a new page. If there’s just one appendix label it ‘Appendix’ without a number, but if there are more than one label them Appendix A, Appendix B, etc. In the main text of your assignment, refer to the Appendix by the label, e.g. Appendix A. * * * ### **Tops and Bottoms of Pages** Check the top and bottom of your pages to ensure they avoid: * widows – single lines of text at the top of a page * orphans – first lines of paragraphs at the bottom of a page * tombstones – headings or subheadings alone at the bottom of a page * split lists – lists that are divided between two pages (if possible).
In case you have a similar question and need it answered for you just click Order Now. At Academizzed.com we have all the most qualified academic writers and tutors, for all your assignments, essays, cases studies, discussion posts, project proposals, research papers, discussion posts, nursing assignments, admission essays, blog articles, and other forms of academic work.