Children’s Internet Protection Act.

Affinity Diagram

The purpose of the PowerPoint presentation is to show threats, vulnerabilities, and recommendations in an affinity diagram.
An example of this diagram is provided in your textbook on page 95.

As a risk management project manager, you must identify the threats, vulnerabilities, and recommendations for ABC IT
Organization’s application database server. The following must be provided with speaker notes in the notes section of each
slide.

  1. Title Slide
  2. Threat Slide
  3. Vulnerability Slide
  4. Recommendation Slide
  5. Reference Slide
    Your presentation must be at least five slides in length. Slides two, three, and four must contain at least one graphic
    (picture, photograph, graph). Your slides must contain speaker notes. You are required to use at least three resources in
    your presentation, one of which must be your textbook. Your reference
    slide and in-text citations must be in APA style.

Section 2: Risk Assessment Compliance

The purpose of the PowerPoint presentation is to correlate the compliance with applicable laws to the risk management
scope. This is important in mitigating the strategies in the risk management plan.

From the list below, select one of the laws/compliance for your PowerPoint presentation:

  1. Health Insurance Portability and Accountability Act,
  2. Payment Card Industry Data Security Standard,
  3. Federal Information Security Management Act,
  4. Sarbanes-Oxley Act,
  5. Family Educational Rights and Privacy Act, or
  6. Children’s Internet Protection Act.

Sample Solution

find the cost of your paper

This question has been answered.

Get Answer