Risk Analysis Assignment

Great Essays
Instructor Due Date

Part 1 2 3 4 Total
Maximum Points
25 points 25 points 25 points 25 points 100 points

Your Score

Textbook Reading Assignment

Read Chapter(s) 14 , 19 , 20 , 21 in your Information Security textbook.

Part 1 Glossary Terms - Risk Analysis

Define, in detail, each of these glossary terms from the realm of computer architecture and operating systems and computer topics, in general. If applicable, use examples to support your definitions. Consult your notes or course textbook(s) as references or the Internet by visiting Web sites such as:

http://www.askjeeves.com http://www.webopedia.com http://www.wikipedia.org

(a) data warehouses

A data warehouse is a data system which houses queryable
…show more content…
(d) threats

A threat can be determined as a result of a risk analysis. In computer security, a threat refers to anything that contains the potential to cause extreme harm to a computer system. If a threat exists it does not mean that something will happen, it simply means that something has the potential to cause serious damage.

(e) vulnerabilities

A vulnerability is a weakness to the security of a system that allows for serious harm when an attacker has the skills and tools to exploit that weakness.

Part 2 Exercises - Risk Analysis

Write a brief but complete answer for each of these. (1) What are four different types of assets that you are likely to encounter with Risk Analysis?

The first type of assets are logical assets. This type of asset includes conceptual items such as locations, cost centers, vendors, and departments. The next type of assets are physical assets. These types of assets include items such as device hardware and software, as well as office furniture. The last two types of assets are tangible and intangible soft assets. Tangible soft assets can be defined as human resources. Intangible soft assets can be defined as brand, knowledge, and
…show more content…
(1) What are some safeguards to prevent any network or computer system attacks?

One of the first ways than an organization can prevent a computer system attack is by installing a firewall. This will serve as a way to filter data between a host and another network.

(2) Risk analysis is not a single activity, but rather a group of related activities. They typically take which sequence of steps?

The steps involved in risk analysis are; (1) identifying any potential risks, (2) assessing the risks the risks that are found, and (3) controlling threats to an organization 's IT infrastructure in hopes of lowering or eliminating security threats. Two factor authentication is another method for attempting to block unauthorized access to a system, network, or general sensitive information. Two factor authentication requires "something you know"; a password or PIN, and "something you have"; a card, dongle, cellphone, or other piece of hardware. Finally, it is possible to reduce an attacker 's chances by keeping systems up to date with items such as security patches and system software and hardware

Related Documents

  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Strategic Financial Plan Team B FIN/486 September 30th, 2014 Daniel Konzen Strategic Financial Plan The Huffman Trucking Corps strategic planning is the reason why they have been in business since 1936. The financial portion of the strategic plan is crucial for the company’s continued growth and existence. The statements will be from the last 3 years consisting of income statements, balance sheets, and cash flow statements. All three statements will explain major assumptions and identifies areas of risk.…

    • 1313 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Unit 4222-320 Support individuals to live at home Outcome 1 Understand the principles of supporting individuals to live at home 1. describe how being supported to live at home can benefit an individual…

    • 2495 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    In unit 3, Kroger’s risk was identified to determine what, if any risk levels existed and the controls needed to mitigate potential damages. Risk Identification can be achieved using several tools or application checklists to identify and describe exposures, which are: Risk Analysis Questionnaire, Financial Statement Method, Flowchart Method, On-site Inspections, and Environmental Scanning (Fraser & Simkins, 2010). Additionally, Key Risk Indicators, which indicates whether the risk exists or is emerging and the consequences can vary from minor to catastrophic (Bethel, 2016). Ultimately, the risk analysis process helps identify and manage potential problems or focus on key business initiatives (Manktelow, 2007).…

    • 464 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Market Risk Analysis

    • 829 Words
    • 4 Pages

    Risk can be measured in two ways namely, the market risk and specific risk. The market risk and specific risk are the components that make up the total risk of any investment. Market risk and specific risk are two different forms of risk that affect assets. Market risk is also referred to as systematic risk and it affects a large number of asset classes (Nickolas, 2015).…

    • 829 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Authorization and privileges are created and granted, which will include which part of the system will be user interfaces and interaction, how to keep all security controls, and threats are identified. In the implementation phase, vulnerabilities and threats are now looked for in the code in the structural errors and input errors (Howard, 2005). Testing of the code is the best way to perform this task. In the verification phase, it will include a final security check that will review all code that interacts with all attacks surfaces found in the design phase. Lastly, a security review is done, where the security measures are explained in terms of the end client’s stances and what and how the product is setup to withstand attacks in the future (Howard, 2005).…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The fourth element of risk is the Risk Culture in an organization. This encompasses the structure / framework an institution deploys to strengthen mindsets and behavior of employees, which in other words is employee empowerment. An example of this would be an institution that…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    .The cardinal reasons responsible for hazardous activities as per these code of conducts are emission of inflammable or toxic fluids due to leakage problem, lost control over controlled operational processes, sudden fires or explosion on working site due to short circuits and last but not the least is damage to structure of transportation ships and carriages due to collision leads to total failure of ship or carriage. In order to support these rational facts, some incidents can be analyzed from the past that will provide a crystal clear view to the scenario (Godoy et al. 2012). In year 2009, a very strong and reputed company of India ,Indian Oil Company has its plant in south side of Jaipur where during a particular operation of transferring…

    • 1227 Words
    • 5 Pages
    Improved Essays