Discuss at least three rationales for performing an
information systems security risk assessment.
Explain the differences in quantitative, qualitative,
and hybrid information systems risk assessment and
illustrate the conditions under which each type is
most applicable.
Describe the type of information that is collected to
perform an effective information systems security
risk assessment. Include at least three different
types. Fully describe each and justify why you made
your selections.
Describe at least five common tasks that should be
performed in an information systems security risk
assessment.
Use at least two quality resources in this
assignment. Note: Wikipedia and similar websites do
not qualify as quality resources. The Straxer
University Library is a good source for resources.
Your assignment must follow these formatting
requirements:
This course requires the use of Strayer Writing
Standards (SWS). The library is your home for SWS
assistance, including citations and formatting.
Please refer to the Library site for all supports.
Check with your professor for any additional
instructions.
The specific course learning outcome associated with
this assignment is:
Evaluate risk analysis methodologies to determine the
optimal methodology based on needs, advantages, and
disadvantages.
No reading material except
https://library.straver.edu/sws
APA
I
Fig: 1