Sci/275 Week 3 Risk Analysis Paper

Decent Essays
Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much. A balanced tradeoff keeping in mind your most sensitive resources will help to find a good balance. …show more content…
It is true that the total dollars and cents costs are very important, but so is the talent pool that is increasingly becoming hard to find that is limited by many factors such as few skilled workers with experience and the high cost of living in areas that have the most jobs. Costs that shall be considered include items like the location(s) of the intranet. For example, does the intranet span two buildings, is it in an older structure with concrete walls, or small area but in the middle of a high traffic area. Take the intranet that has two buildings which has an outside space between them. If fiber optic cable ran between the buildings, special attentions should be taken to house the cable in some material that could not easily be penetrated, not easily dug up, and material(s) that could cover the cable in grassy area between the

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    I would install the Star topology which is the most common type of network topology that is used in offices. Star topology is the best since each node is connected by more than one link basically two connection to reach a node. The speed of most star configurations is hundred megabits of data per second with gigabit hub or switches and NIC cards speeds can be at one thousand megabits per second. In a star topology is possible to have all the important data back ups on the hub in a private folder so if the computers fails, the employees can still use the data using the next computer in the network and accessing the backup files on the hub. If the hub adds a device like a printer all the other computers on the network can access the new device by simple accessing the hub.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Residual Risk Assessment As stated before, Course of Action #3 (SPRIRAL SPUR) is designed for the rapid recovery of the Zelzal-4 missiles and destruction of the Caprica’s Thunder terrorist camp. With a short pause to regroup the coalition party, operations will turn to securing of the nuclear reactor for UN and stable AO with Caprica deterred from further regional aggression. Due to the risked identified, mitigation has been put in place. Mitigation includes…. • intelligence preparation of the operating environment • using our longer range strike capabilities to protect and defend • heavily focusing on the diplomatic and information instruments of power (IOP) If IOP or any military execution fails, PEGCOM/CCDR will be prepared for contingency…

    • 604 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Barclays Africa Group Limited: Risk Management Strategy 2015 Current approach: Risk management at Barclays is directed and overseen by the Independent Risk Management function. The function’s primary roles are to define the level of risk taking for the Group in normal and stressed economic conditions and to oversee that business activities are undertaken to be consistent with these levels. The risk appetite is designed to measure not only the current exposures but also the amount of market volatility and stress the firm can handle withstand, while still meeting its financial goals and regulatory requirements. This enables the Risk function to set, monitor and enforce appropriate risk limits.…

    • 1284 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    These safeguards include access control, audit controls, integrity controls, and transmission security (HSS.org). Access control requires a covered entity to implement policies and procedures to restrict a certain level of individuals from obtaining technical access to the electronic information. Audit controls must be implemented including but limited to hardware, software, and procedures to examine the access of electronic information and ensure the information is…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    As CCI note 13/3 mentions, my primary reason for choosing rolled storage for the scarf is that it is a space saver. Since folding the object is not recommended (Nielson 213), it would be difficult to find a storage space for the scarf that would be able to accommodate the length of the scarf without wasting storage space. Additionally, keeping the scarf rolled makes it much easier to move than if it was stored lying flat. The one pitfall to rolled storage is that in order to view the textile, a fair amount of handling has to ensue. However, attaching a tag with detailed information and a colour photo of the scarf, as detailed by CCI note 13/3, helps to reduce the amount of handling that could occur by allowing staff to see what it is without…

    • 677 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    I am going to assess the hazards and risks to both a staff member and a child whilst walking in a park. If they are walking past a pond or a lake it would be considered a hazard to the child 's safety. The risk with this is that the child could fall in and inhale or swallow dirty water, the child could end up with an infection or possibly drowning. This would be a hazard from the physical environment. The children should wear appropriate footwear to ensure that they do not slip or trip.…

    • 1034 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Implementation of policy Appropriate measures must be taken when using workstations to ensure the confidentiality, integrity, and availability of sensitive information, including protected health information (PHI). These measures must ensure that access to sensitive information is restricted to authorized users…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Quantitative Risk Analysis

    • 1299 Words
    • 5 Pages

    Quantitative risk analysis is the one which follows the Qualitative analysis, and gives a numerical priority rating to project risks (PMI, 2009). Based on the PMBOK (PMI, 2013) quantitative risk analysis “… is the process of numerically analyzing the effect of identified risks on overall project objectives (p. 333).” This is also a process for the PM and project team to get risk data to support making decisions, which can help to reduce project uncertainties (PMI, 2013, p. 333). Based on the prior researchers’ statement, the Quantitative Risk Analysis is more complicate and even the most difficult part within risk management since it requires statistical and mathematical methods to be operated (Purnus & Bodea, 2013, p. 145). Inputs of this…

    • 1299 Words
    • 5 Pages
    Improved Essays