dolution

dolution.

INTRODUCTION:
Our project will be about risk assessment in universities, with a focus on online learning tools and how they can benefit university employees and students, as well as what risks they may face.
Online learning is a form of internet education delivery system that facilitates synchronous and asynchronous resource exchanges across a communication network. It stores content in content repositories and employs Web-based technology to enable students engage with instructors and other students. As the Internet has grown in popularity, an increasing number of people are enrolling in online learning tools like Banner , Black board and LMS .
Online learning tools will benefit teachers in the following ways: Determine a clear learning objective and assessment outcome for each lesson. Marking students’ work is simple, reviewing students’ work is simple, and using multimedia materials to help students remember knowledge and produce engaging lessons is simple. It’s simple to write a review for students.
Furthermore, the advantages of the students will be on It is simple to submit work on time. Finish quizzes more quickly than on paper, Examine the attendance record. Examine your grades and comments.
As an Internet-based learning approach, online learning tools rely on the Internet for its execution. On the other side, the Internet is a center for a range of interesting activity and potential threats. As a result, security threats, dangers, and attacks are always available in the e-learning environment.
Many educational institutions, unfortunately, are rushing to install online learning management systems without careful planning or a thorough understanding of online learning security. When it comes to online learning, security refers to the fact that “all authorized users have access to learning resources when they are needed.” Any component of an online learning system can be hacked or attacked since it takes place over the Internet.
QUESTIONS:
1. Risk Assessment Methodology and tools: Provide description of Risk assessment methodology. Are you following any standard to conduct Risk Assessment? Are you deploying any Risk assessment tool?
2. Identification in Planning PhaseA) Assets { List down Assets either in bullets or table also provide cost}B) Threats { List down threats in your system under discussion}C) Vulnerabilities { List down threats in your system under discussion }D) Control measures { List down available control measures in your system under discussion }
3. Risk Assessment Matrix- Develop a Risk Assessment Matrix for the Project to define a minimum of 3 severity levels. The Risk Assessment Matrix may be unique to the Project or may be developed from a publicly available version. Each risk event identified should be rated for its severity based on the Likelihood of Occurrence and the Impact on the Project and the results documented in the Risk Register. Based on the severity rating, the risks should be prioritized and the results entered into the Risk Register.
4. Risk Response: Develop a Risk Response for each High Severity risk. The Risk Response should provide a mitigating action and assign the risk to one person to manage. The mitigating action should be specific to the Project and lower the overall impact on the Project or lower the likelihood of occurrence. More than one mitigation technique may be used for each risk. Each Risk Response should be recorded in the Risk Register.

dolution

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now