Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Information Security Risk Management Assignment

For this exercise, read the provided case study about AcmeHealth, and re-rate the risk exposure for each finding related to the following assets:

1. Code Repository
2. QA Server
3. Production Application Server

Assume that additional information has been provided below by the Subject Matter Experts during the qualification process. Be sure to note any findings where you are changing your original assessment of the risk level and why. Review the provided example as a guideline.

Like the last assignment, you will need to assess the severity of each violation and also the likelihood that it would cause a breach of security.

Use the severity and likelihood scales from Appendix B in the book (Tables 6.11 and 6.12) to evaluate each finding. A mapping table is provided (Figure 6.2) to calculate the Risk Exposure value for each severity/likelihood pair without taking sensitivity into account for now.

If you don't understand the technical details of any of the findings, please post questions to the Discussion Forum and ask the instructor to clarify.

You can turn in the assignment electronically through Blackboard.

Review each finding again, and assume that the following answers have been provided by the subject matter experts for that resource. Use these answers to provide a more informed assessment of the risk below:

Table 1 - Finding Qualification Updates

#

Resource

Finding

Qualification Answers

1

Code Repository

Resource administrators don't verify the integrity of the information resource patches through such means as comparisons of cryptographic ...

-  All updates are obtained directly from the vendor's site (IBM in this case for the AIX servers)
-  All patches are thoroughly tested in DEV, and QA environments before being installed on the Code Repository Server.

2

Code Repository

Network connections from the offshore developers' workstations to the code repository server are not encrypted.

-  Sessions to the server never expire
-  Password complexity is not enforced by the server
-  Connections from the offshore network to AcmeHealth's network is across a VPN
-  Some scripts containing passwords are stored in the code repository

3

QA Server

Client data is copied from production servers to this server regularly for QA testing.

-  Data is not stored encrypted on the QA Server
-  Developers have privileged access to the database in QA
-  The QA Server allows connections from the Internet to simulate client traffic and performance testing

4

Production Application Server

No one notifies the Help Desk of terminations for support personnel in order to ensure that their access is disabled.

-  Administrative interfaces can only be accessed from the internal network
-  Server audit logs are retained on a separate SEIM infrastructure
-  Accounts that aren't used for 180 days are automatically disabled
-  Both the application and databases servers are behind firewalls

Please note that you are reassessing these findings. Finding 1 is provided as an example.

Record your new severity and likelihood ratings and justifications below, being sure to note if the overall risk rating for the finding has changed now that you have more information. An example for the first finding has been provided:

Finding 1:

Severity: High Justification: The potential severity of this risk has not changed. If malicious code is allowed onto the system through an application patch, this could compromise that application potentially allowing backdoor access to attackers or allow sensitive data to be sent from the application to the attackers. The malicious code may also cause the application to be unstable, causing it to crash periodically.

Likelihood: Negligible Justification: The potential likelihood of this risk has been lowered from Low to Negligible, because patches are always obtained from a credible and trusted source (the vendor is IBM in one case), and all patches are tested thoroughly in both the Development and QA environments before being applied to more sensitive Code Repository Server. Although it is possible for attackers to place fake application patch updates on sites that look legitimate, for most commercial software this would be more difficult and the attacker would have to be very motivated and have a high level of skill. Even if the attacker was able to compromise the vendor's server, the malicious patch would likely be discovered during DEV or QA testing before it reached the Code Repository server.

Risk: Low Justification: The overall risk of system or data compromise through a maliciously crafted patch update has not changed. It is still very unlikely that a malicious update would be applied to the Code Repository server without being detected first. If one were to take it past the several layers of control, this could put the server in jeopardy of being controlled by an outside attacker. In this case, an attacker could modify the code to put backdoors into the production application, or more likely the proprietary code could be stolen.

Finding 2:

Severity: ________________ Justification: ______________
Likelihood: ________________ Justification: _____________
Risk: ________________ Justification: _________________

Finding 3:

Severity: ________________ Justification: ______________

Likelihood: ________________ Justification: _____________

Risk: ________________ Justification: _________________

Finding 4:
Severity: ________________ Justification: ______________

Likelihood: ________________ Justification: _____________

Risk: ________________ Justification: _________________

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92301842
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Management Information System

Question sources that can help you with hardware

Question : Sources that can help you with hardware troubleshooting include the user manual, the Internet, online technical support, technical forums, diagnostic software and your network of technical associates. In which ...

Question what is information securityhow does the proper

Question : What is Information Security? How does the proper application of Information Security can reduce risk? Format your assignment consistent with APA guidelines.

Middot explain what is meant by effective html code decide

· Explain what is meant by effective HTML code. Decide if all HTML code should be the same (standardized) or at the discretion of the designer. Explain your decision. · From the e-Activity, describe what you learned abou ...

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Big data and data analytics are hot topics that are

Big data and data analytics are hot topics that are frequently in the media these days. Much of the application of these mathematical concepts is industry specific, and the information security industry is no exception. ...

Question 1 what is phase change memory and why are its

Question : 1. What is "Phase Change Memory" and why are its potential applications a significant impact? Who are the major players in this field? Who might be in the near future? 2. What is the definition of "emergent" a ...

Individual projectusing proper apa format write 2 to 4

Individual Project Using proper APA format write 2 to 4 pages on the following • Search the Internet for an article where physical security failed • Propose and discuss possible changes in that organization's physical se ...

Management of it systems and projects assignment - work

Management of IT Systems and Projects Assignment - "Work Breakdown Structure & Project Schedules using Microsoft Project" There are two parts to this assignment: Part 1: MS Project Project Title: Dai-Ichi Corporation Aus ...

Assignment wireless technologythere are a number of

Assignment : Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As