Vulnerabilities And Threats

Great Essays
C Analyze risks
Identifying the mechanism that deal with the recognized risks and measure their strength. Based on this assessment, considering the risks in terms of possibility and significance, and the present risk level.
Risk analysis is the procedure of defining and analyzing the threats to personals, organization and government agencies posed by potential natural or human-caused adverse events. A risk analysis aids to integrate security program with the company 's goals and requirements. It also helps the company to assign a suitable budget for an effective security program and its components. After a company recognizes the significance of assets and the likely threats to be exposed, it can make good decisions on the amount of effort
…show more content…
An important question is the cost, which company might have to pay if not protecting the asset.
Identify vulnerabilities and threats
Once the assets have been known and their values allocated, all the possible vulnerabilities and threats has to be identified for each of them. The security team should identify the vulnerabilities which could affect confidentiality integrity, or availability requirements. All the obtained information need to be documented so that the required countermeasures can be applied.
As there might be a large number of vulnerabilities and associated threats that could disturb the assets, it is also important to be properly categorize them. The main objective is to find out which vulnerabilities and threats might cause the maximum damage so that the critical items can be taken care on the priority basis.
Measuring the possibility and impact of the potential threats on the business
To evaluate possible losses caused by threats, the following questions need to be
…show more content…
The goal of this step is to identify a list of system weakness, by using security test of system, audit comments and security requirements that could be exploited. These weaknesses generate the threat/vulnerability pair.
Control Analysis
For every threat/vulnerability pairs, identify all the possible existing and planned controls to decrease the risk of the threat to exploit vulnerability. Security controls involve the use of technical and non-technical approaches. Technical controls are protection that are combined with computer hardware, software, and firmware. In the other hand Non-technical controls are administrative and operational controls, for instance operation procedure, security policies and environmental security.
Likelihood:
Likelihood specifies the chance that a possible vulnerability may be exercised within the construct of associated threat environment, which may be very likely, probable, and improbable.
Impact

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of. The key decision makers in a security project would include: Chief Executive Officer: The most senior corporate officer reports to the board of directors.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    Technical Security: Technical controls focus on security controls that the computer system executes. The controls can provide automated protection for unauthorized access or misuse, facilitate detection of security violations, and support security requirements for applications and…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    P1 – The impacts that different types of threats have on an organisation Technical Failure A technical failure can be caused for many different situations. Most devices will fail at some point because of some kind of error. There are certain measures that can be put into place to avoid these errors from occurring more often. Such as the training of staff of the device they are using so these issues will become less common and then they will also be to most likely solve the problem also.…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Physical access control, audit review: Unauthorized access to sensitive facilities could occur without challenge, during which time a malicious party may directly connect to the supervisory control and data acquisition (SCADA) system and potentially set up a more permanent and remote connection for ongoing unauthorized access at a later time. Physical access to organizational facilities is a security vulnerability if not control as unauthorized personnel may access critical or sensitive areas. 5. Audit review, analysis and reporting: Without formalized review and validation of logs, unauthorized users, applications, or other unauthorized events may be present in the system and operate in the industrial control systems network without detection. 6.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Hsc300 Case Study

    • 483 Words
    • 2 Pages

    ID Risk / description Category Probability (1-5) Impact (1-5) Risk Factor (P*I) /Rank Potential Responses Owner Trigger R1 Too many patients may use the application, causing performance disturbance. As of now it holds good for 200 patients.(Unsustainable User growth) Technical 4 3 12/3 M-…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hazard Identification Nvq

    • 299 Words
    • 2 Pages

    First is hazard identification. This is the process of examining each work area and work task for the purpose of identifying all the hazards which are “inherent in the job”. Work areas include but are not limited to machine workshops, laboratories, office areas, agricultural and horticultural environments, stores and transport, maintenance and grounds. Second is risk identification, once a hazard to health and safety has been identified, the risk associated with that hazard must be examined. As a prelude to Risk Assessment, it is useful to identify factors that may be contributing to the risk.…

    • 299 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Identifying and managing risks is a critical responsibility of project managers. Risk is defined as the probability of a specified threat and the subsequent impact that the event produces (Vaidyanathan, 2013). Risks can also bring about either positive or negative outcomes for a project or organization. A project manager must identify potential risks and evaluate each one to determine the severity and likelihood of each event. Only by completing the risk management process, a project manager can determine what approach would work best to avoid, mitigate, and/or transfer the risk.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Authorization and privileges are created and granted, which will include which part of the system will be user interfaces and interaction, how to keep all security controls, and threats are identified. In the implementation phase, vulnerabilities and threats are now looked for in the code in the structural errors and input errors (Howard, 2005). Testing of the code is the best way to perform this task. In the verification phase, it will include a final security check that will review all code that interacts with all attacks surfaces found in the design phase. Lastly, a security review is done, where the security measures are explained in terms of the end client’s stances and what and how the product is setup to withstand attacks in the future (Howard, 2005).…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    .The cardinal reasons responsible for hazardous activities as per these code of conducts are emission of inflammable or toxic fluids due to leakage problem, lost control over controlled operational processes, sudden fires or explosion on working site due to short circuits and last but not the least is damage to structure of transportation ships and carriages due to collision leads to total failure of ship or carriage. In order to support these rational facts, some incidents can be analyzed from the past that will provide a crystal clear view to the scenario (Godoy et al. 2012). In year 2009, a very strong and reputed company of India ,Indian Oil Company has its plant in south side of Jaipur where during a particular operation of transferring…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Quantitative Risk Analysis

    • 1299 Words
    • 5 Pages

    Quantitative risk analysis is the one which follows the Qualitative analysis, and gives a numerical priority rating to project risks (PMI, 2009). Based on the PMBOK (PMI, 2013) quantitative risk analysis “… is the process of numerically analyzing the effect of identified risks on overall project objectives (p. 333).” This is also a process for the PM and project team to get risk data to support making decisions, which can help to reduce project uncertainties (PMI, 2013, p. 333). Based on the prior researchers’ statement, the Quantitative Risk Analysis is more complicate and even the most difficult part within risk management since it requires statistical and mathematical methods to be operated (Purnus & Bodea, 2013, p. 145). Inputs of this…

    • 1299 Words
    • 5 Pages
    Improved Essays