{"id":30470,"date":"2026-04-22T05:01:47","date_gmt":"2026-04-22T05:01:47","guid":{"rendered":"https:\/\/academicwritersbay.com\/solutions\/mission-2-chance-prognosis-description-for-this-project-you-will-proceed-your-research-from-mission-1-by-reviewing-and-then-examining-your-chosen-firms-threat-statements-as-printed\/"},"modified":"2026-04-22T05:01:47","modified_gmt":"2026-04-22T05:01:47","slug":"mission-2-chance-prognosis-description-for-this-project-you-will-proceed-your-research-from-mission-1-by-reviewing-and-then-examining-your-chosen-firms-threat-statements-as-printed","status":"publish","type":"post","link":"https:\/\/academicwritersbay.com\/solutions\/mission-2-chance-prognosis-description-for-this-project-you-will-proceed-your-research-from-mission-1-by-reviewing-and-then-examining-your-chosen-firms-threat-statements-as-printed\/","title":{"rendered":"Mission 2 \u2013Chance Prognosis Description For this project, you will proceed your research from Mission #1 by reviewing and then examining your chosen firm\u2019s threat statements as printed every twelve months within the firm\u2019s Annual File"},"content":{"rendered":"<p>Mission 2 \u2013Chance Prognosis Description For this project, you will proceed your research from Mission #1 by reviewing and then examining your chosen firm\u2019s threat statements as printed every twelve months within the firm\u2019s Annual File to Investors (additionally printed within the firm\u2019s annual submitting of SEC Invent 10-K). After examining the firm\u2019s IT operations and its threat statements about these activities, you will create and document your personal IT centered threat evaluation including both its predominant operations and all supporting industry processes. Your threat evaluation will additionally address data risks and technology risks which you resolve in your research about the firm. Reveal: sooner than beginning attach this project, you ought to overview NIST SP 800-30 R1: Data for Conducting Chance Assessments. Pay special consideration to Appendix D: \u201cChance Sources: Taxonomy of Threats Sources Able to Initiating Chance Occasions\u201d and Appendix H: \u201cAffect: Effects of Chance Occasions on Organizations, Individuals, and the Nation.\u201d Conduct Additional Research for Your Chosen Firm 1. Lengthen the research that you simply did for Mission #1 by reviewing the firm\u2019s internet express to learn more about the firm\u2019s industry areas and operations. 2. Retrieve the Hoovers profile for the firm. It is critical to employ the same firm and profile that you simply extinct for Mission #1. The defective URL for Hoover\u2019s is http:\/\/ezproxy.umgc.edu\/login?url=http:\/\/www.mergentonline.com\/Hoovers ***COMPANY&#8217;S 10Q AND 10K FINANCIAL STATEMENTS WHICH IS PUBLIC INFORMATION AND CAN GOOGLE PLEASE, DO NOT HAVE TO USE HOOVER 3. Review the SWOT and Technologies in Use sections of the Hoover\u2019s profile. 4. Retrieve the Invent 10K for the firm the utilization of the URL supplied in Mission #1. 5. Identify 3 or more extra sources of data about the firm and the plot in which it makes employ of Data Technologies to behavior its industry operations. These sources may maybe well even be news articles, data breach stories, etc. 6. The employ of the information received from your sources, title the forms of data and industry operations which force this firm\u2019s want for cybersecurity merchandise and products and companies. (What data or data infrastructures want to be stable?) Analyze the Data and Data Technology Risks for Your Firm 1. Retrieve the Invent 10K for the firm you reviewed for Mission #1. 2. Read and analyze the Chance Components part within the firm\u2019s most modern Invent 10-K (pay stop consideration to Item 1.A). This Invent 10-K features a professionally written threat evaluation that has been written for a particular target audience (merchants and shareholders). Pay stop consideration to what the firm includes as threat factors and the plot in which the writers chose to present this data. 3. Analyze the threat factors, as acknowledged by the firm, to gain out which ones are related to data and data technology extinct in its industry operations or which can perhaps well be otherwise plagued by technique of data in digital gain and Data Technology systems and infrastructures (e.g. financial risks related with digital currency transactions). 4. Review the SWOT Prognosis from the Hoovers document. Identify data or IT related threat factors offered in this evaluation. SENT THIS AS A FILE AS WELL *** 5. Review the Technologies in Use a part of the Hoovers document. Desire 5 or more specific applied sciences in employ by the firm which make contributions to the firm\u2019s threat factors. You&#8217;ve to evaluate specific vulnerabilities or recent attacks in opposition to those applied sciences. Use the product title adopted by \u201cvulnerabilities\u201d in an Cyber internet search engine to retrieve vulnerabilities stories. 6. Total your research by reviewing news tales and cybersecurity analyst stories of how this firm or the applied sciences it makes employ of may maybe well even be attacked or compromised in ways that adversely influence its IT safety posture. (Use recent news tales and blogs from IT safety analysts at firms similar to Sophos, SC Journal, Norton, Mandiant, etc.). Carry out and File Your Chance Profile 1. Originate by copying Table 1 from this project file correct into a new file (for your assignme<\/p>\n<p>Carry out and File Your Chance Profile 1. Originate by copying Table 1 from this project file correct into a new file (for your project submission). This table will change into your Chance Profile Table. (Delete the instance text.) 2. Transfer your identified threat factors and technology vulnerabilities into the Chance Profile table (one merchandise or threat part per row). a. Enter a special Chance ID for every row. b. Enter a transient nonetheless abnormal title for every threat part or technology vulnerability c. Enter a description that temporarily explains what the threat or vulnerability is. Identify the information, digital resources, and\/or industry operations (processes) plagued by this threat, e.g. of us, processes, or applied sciences that want to be stable from threats and attacks (including insiders and exterior threats). d. Within the class column, categorize the form of threat or threat that will perhaps well have an effect on the merchandise. You may employ the major \u201cIndividuals, Processes, Technologies\u201d framework or create a residing of lessons of your personal selecting. e. Within the influence column, rate the doubtless for loss or anguish need to this threat materialize (an attack occurs). You may employ \u201clow, medium or high\u201d nonetheless be aware that rating the full lot on the same level is rarely any longer precious when executives with cramped budgets want to allocate funding for threat remediation (which you will address in Mission #3). 3. Should always you is at possibility of be done, you wish to ranking identified and documented 15 or more risks related to the firm\u2019s industry operations, employ of the Cyber internet, the firm\u2019s IT systems and infrastructures (including \u201capplied sciences in employ\u201d), and the forms and collections of data extinct by the firm. Write 1. An introduction part which identifies the firm being discussed and supplies a transient introduction to the firm (you can simply reuse about a of your account from Mission #1). Your introduction need to consist of a transient overview of the firm\u2019s industry operations. 2. A separate evaluation part in which you listing this firm\u2019s needs or requirements for IT safety. What are the doubtless sources of threats or attacks for every type of data or industry operation? What data and\/or industry operations want to be stable? Originate sure to title and focus on the sources of data extinct in your evaluation. 3. A separate evaluation part in which you present your threat profile in table format. Provide an introductory paragraph that explains the threat profile, e.g. what data is contained within the table and what sources were extinct to blueprint this data. In your introductory paragraph, title the sources extinct to present the information offered within the table. This attribution will take the intention of in-text citations within the outline column and makes the table more uncomplicated to read. 4. A separate closing part which supplies a summary of the threat evaluation, the identified risks, and ability impacts of risks upon the firm\u2019s operations as a complete. Additional Data 1. Your 8 to 10 internet page Chance Prognosis needs to be respectable in appearance with consistent employ of fonts, font sizes, colours, margins, etc. It is critical to employ headings and sub-headings to prepare your paper. Use headings which correspond to the exclaim rows within the rubric \u2013 this may maybe perhaps perhaps simply make it more uncomplicated for your teacher to gain required exclaim formula and need to can wait on you be certain you ranking lined all required sections and exclaim in your paper. 2. The acknowledged internet page length is a recommendation based totally mostly upon the exclaim requirements of the project. All pages submitted will be graded nonetheless, for the absolute best grades, your work ranking to be definite, concise, and upright. Exceeding the advised length is rarely any longer going to basically lead to a larger grade. Shorter submissions may maybe perhaps simply no longer fully meet the exclaim requirements ensuing in a lower grade.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mission 2 \u2013Chance Prognosis Description For this project, you will proceed your research from Mission #1 by reviewing and then examining your chosen firm\u2019s threat statements as printed every twelve months within the firm\u2019s Annual File to Investors (additionally printed within the firm\u2019s annual submitting of SEC Invent 10-K). After examining the firm\u2019s IT operations [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-30470","post","type-post","status-publish","format-standard","hentry","category-solutions"],"_links":{"self":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/30470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/comments?post=30470"}],"version-history":[{"count":0,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/30470\/revisions"}],"wp:attachment":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/media?parent=30470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/categories?post=30470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/tags?post=30470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}