CIS 502 Technical Paper Week 10 Assignment Risk Assessment http://homeworkfy.com/downloads/cis-502-technical-paper-week-10-assignment-risk-assessment/ To Get this Tutorial Copy & Paste above URL Into Your Browser
Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com
Visit our Site for More Tutorials: (http://homeworkfy.com/ )
CIS 502 Technical Paper – Week 10 Assignment Risk Assessment CIS 502 Week 10 Technical Paper
Technical Paper: Risk Assessment
Global Finance, Inc.
Internet OC193 10Gbps
Remote Dial UpUsers
OC193 10Gbps
DMZ
Border (Core) Routers
Distribution Routers
VPN Gateway
10Gbps
RAS
PBX
Printers Mgmt (x3)
Credit Dept
Finance
Accounting Worstations Printers
Worstations (x5)
LoanDept
…show more content…
The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.
Write a twelve to fifteen (12-15) page formal risk assessment proposal and redraw the above diagram of a secure and risk-mitigating model in which you:
1. Describe the company network, interconnection, and communication environment.
2. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.
a. Describe and
The last step in a risk management plan is to evaluate the risks. This is a learning step and works to provide experiences gained form working with risks. This evaluation should consider all aspects of the plan and identify best practices. The evaluation should answer the questions pertaining to how the project team did, what could be done better, what lessons were learned, and how can best practices be incorporated into the risk management process. This risk evaluation helps to influence how the organization will plan, prepare and commit to future risk management plans.
3.4 summarise the types of risks that may be involved in assessment in own area of responsibility.
It is the policy of Western Governors University (“WGU”) that student Capstone projects should not be based upon, and should not include, any proprietary or classified information or material belonging to your employer or any other organization (“Restricted Information”) without appropriate authorization.
For the case study provided with this Assessment Task, you are required to review risk management processes and determine scope and objectives, taking into account stakeholder input and both internal and external environmental factors affecting the organisation. With the information gathered, you are
This project identifies a two possible issues that can happen during the system operations like hacking or data loss due to improper security provided to the company branches and there is no proper infrastructure of the firewall for the network structure. The aircraft security policy result in failure due to their two year reset program.
1.3- Explain what risk assessment is and how this is managed in the work setting.
Xander L. is a 17-year-old African American male and documented gang member. His prior juvenile adjudications include purse snatching, breaking and entering, and drug possession. His first juvenile adjudication occurred when he was 13 years old. He has served a year of custody in the juvenile correctional facility and has been placed on probation twice
This section will introduce the serviceability’s own user interface (UI) functionality, system (network traffic), and connectivity tests along with quality accessibility reporting. The QA team must document result finding from testing UI, system and connectivity outcomes and report all metrics for a good test outcome.
P1. Identify the threats and the consequences of a failure in securities that exist to the security of people, property and premises in a public service.
The Risk assessment will be a vital part of the whole security plan which is a document which basically covers the whole
A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.
IT projects can be many times a daunting task to both the contracted IT Company and the clients. With some short deadlines, there is usually a small window of opportunity to present skills and produce positive results. As a network administrator, the pressure to deliver top notch and a robust system is a priority. U.S. industry Inc is just a young company that has both the quality and skills and knowledge to produce excellent work considering previous contracts that have been undertaken by the company. The US government department aims to expand its network infrastructure to enlarge the capacity and enable it provide quality services.
Use this section to describe any network security vulnerabilities. Use the scenario along with industry standards and best practices to identify the vulnerabilities. Describe why it is vulnerable and what the implication is if it is not mitigated.
Cyber attacks of a nature similar to the DoS attack are a real threat to the operations of any networked system. Prudent planning and preparation can help the organization to minimize the impact of these potentially damaging attacks. The following recommendations can help the company transform from a level where such attacks could cause a total system shutdown to a level where such attacks could cause a slight inconvenience: