Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Write a Brief Description of Your Research Project or Work-integrated Learning Duties/ Responsibilities: Title: Implementing Information Security Strategies for Security Risk Assessment and Threat Management.

Write a Brief Description of Your Research Project or Work-integrated Learning Duties/ Responsibilities:

Title: Implementing Information Security Strategies for Security Risk Assessment and Threat Management.

Project Description: The advance application of Internet-based technology has become the main source of security attacks. In such events, the risks will affect the quality of data so there is a need to protect any organizational valuable assets such as data, privacy and so on. As per my knowledge, implementing information technology frameworks can assist in minimizing the security vulnerabilities that may affect the success of the Amkor Technology Company in the long-term. In this action research, I will involve in the development and implementation of the new security strategies under the supervision of industrial professionals like assistant information security analysts from the Amkor Technology Company. The aim of adopting these strategies is to improve the assessment of security risks and improves the management of security threats at Amkor Technology Company. During this project development process, I will discuss with the industry professionals about the challenges that they experienced in the past as well as the undetectable threats that may affect in the future with respect to information security. It helps to acquire practical knowledge by discussing and laying down the new security strategies with them. By conducting this action research project will help the industry professional to adopt effective measures to combat security risks and improve the management of security threats that their company encounter.

Company Name: Amkor Technology Company Industry Professionals: Ms. Ramya Paruchuri, an information security analyst Mr. Bharath Koganti, an information security engineer

Step by Step Solution

3.46 Rating (156 Votes )

There are 3 Steps involved in it

Step: 1

Title Search Engine Optimization Description The internet based marketing is the new strategy that c... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Financial Reporting and Analysis

Authors: Flawrence Revsine, Daniel Collins, Bruce, Mittelstaedt, Leon

6th edition

9780077632182, 78025672, 77632184, 978-0078025679

More Books

Students also viewed these General Management questions