ERM Roadmap paper

CIS 558 w3 Assignment 1: ERM Roadmap

Assignment 1: ERM Roadmap

The following material may be useful for the completion of this assignment. You may refer to the documents titled “Embracing Enterprise Risk Management: Practical Approaches for Getting Started” and “Developing Key Risk Indicators to Strengthen Enterprise Risk Management”, located at

Imagine you are an Information Technology Manager employed by a business that needs you to develop a plan for an effective Enterprise Risk Management (ERM) program. In the past, ERM has not been a priority for the organization. Failed corporate security audits, data breaches, and recent news stories have convinced the Board of Directors that they must address these weaknesses. As a result, the CEO has tasked you to create a brief overview of ERM and provide recommendations for establishing an effective ERM program that will be used as a basis to address this area moving forward.

Write a three to four (3-4) page paper in which you:

  1. Summarize the COSO Risk Management Framework and COSO’s ERM process.
  2. Recommend to management the approach that they need to take to implement an effective ERM program. Include the issues and organizational impact they might encounter if they do not implement an effective ERM program.
  3. Analyze the methods for establishing key risk indicators (KRIs).
  4. Suggest the approach that the organization needs to take in order to link the KRIs with the organization’s strategic initiatives.
  5. Use at least three (3) quality resources in this assignment (in addition to and that support the documents from the COSO Website referenced in this assignment). Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the COSO enterprise risk management framework.
  • Describe the process of performing effective information technology audits and general controls.
  • Use technology and information resources to research issues in information technology audit and control.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.


Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

1 page apa style

In one page describe the topic below:

The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues:

How the legal environment affects electronic commerce activities

What elements combine to form an online business contract

How copyright, patent, and trademark laws govern the use of intellectual property online

That the Internet has opened doors for online crime, terrorism, and warfare

Web Server Hardware and Software
Web server basics

Software for Web servers

E-mail management and spam control issues

Internet and Web site utility programs


Web server hardware

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

2 pages apa style

Classify the different operational support systems, managerial support systems, and strategic support systems, and explain how managers can use these systems to make decisions and gain competitive advantages.

Describe artificial intelligence and identify its five main types. 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

4 Pages, no plagiarism, dont repeat Question

Week 4 Case Study


As the Business Continuity Manager, you assign responsibilities for the completion of the Business Impact Analysis to each member of your team. You explain to your staff that they will be responsible to calculate the annual loss expectancy (ALE) of assigned risks.  Your staff looks at you bewildered, so you need to explain the formula to them and how to use it.


  • What explanation would you give so that your staff understands that formula?
  • Provide an example of how to use the formula.
  • Develop a matrix using the formula as part of your example.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

C++ Programming

Thinking about repetition loops and things we do more than once can help identify something you would store in an array.  For instance, if we were to define an array named that contained temperatures for the past 19 days, what would the syntax look like? What would the syntax look like to extract the 4th temperature within the array?


Syntax needs to be in C++ format please. Need done my noon!

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

The Wireless Threat

Many say that once physical access is obtained by an intruder that all security is lost.

    • Determine whether or not you believe this is a true statement. Explain in your opinion whether or not wireless networks have decreased the need for hackers to gain physical intrusion.
    • Compare and contrast the security concerns between wired and wireless networks. Determine which you, as senior level management, would consider the greater area of risk and warrant greater security control expenditures. Justify your answer. 


  • Compare and contrast two common threats to wireless local area networks (WLANs) and the security controls that could be implemented to combat each. Imagine you are an Information Technology (IT) Security Director. Explain which of these threats would cause more concern for your organization and how you would justify the expenditures of the selected security concerns to upper management.


Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Stuxnet and Covering Tracks

Explain in your own words the necessity of a hacker concealing his / her actions in the hacking process. Determine what you believe to be, if any, the repercussions that exist for a hacker who doesn’t appropriately cover his / her tracks.

  • From the e-Activity, explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time.
  • eactivity
  • Go to the Wired Website to read the article titled “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History,” dated July 2011, located at Be prepared to discuss.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount