Calculate develetechs risk exposure in this area

Assignment Help Computer Network Security
Reference no: EM133337657

Assignment:

You are a member of the cybersecurity team at Develetech Industries, a manufacturer of home electronics located in the fictitious city and state of Greene City, Richland (RL). The CEO has recently placed you in charge of reviewing your enterprise security strategies following the principle of risk management. When you can identify just how risk negatively affects your enterprise, you'll be able to convince your employer, your team, and the rest of your employees of the importance of managing that risk.

1. Develetech, a relatively large electronics manufacturer, is looking to expand its business domestically and internationally over the next couple of years. This may include everything from taking on new staff to establishing additional offices and warehouses. Why would these changes necessitate the development of an ERM strategy?

2. You've identified a risk to the availability of your file servers at peak traffic hours. How would you prefer to calculate Develetech's risk exposure in this area? What are the strengths and weaknesses of the analysis you've chosen, and why do you think it's more beneficial than the others?

3. One of the possibilities involved in expanding Develetech is the adoption of new technology. Your CEO may decide to drop legacy products or even drop certain vendors altogether and replace them. What are the important things to remember about assessing new products and technologies, along with threats that inevitably come with them?

4. Your team at Develetech has been busy assessing the various risks that could affect the company. Now it's time for you to analyze these results and respond appropriately. Choosing the right risk mitigation strategies is essential in meeting stakeholder expectations and keeping your systems secure at the same time. During their risk assessment, your team has identified a security flaw in an application your organization developed. To conduct a proper analysis of how this could bring risk to your enterprise, what are some of the questions you need to ask?

5. You've analyzed the application flaw and discovered that it could allow an unauthorized user to access the customer database that the app integrates with, if the app uses poor input validation. If an attacker were to access the database this way, they could glean confidential customer information, which would have a high impact on your business. However, you determine that your app's current input validation techniques account for all known exploits of this kind. How will you respond to this risk?

Reference no: EM133337657

Questions Cloud

Describe implement a framework throughout their enterprise : Briefly describe tools, technologies, or software a company can use to implement a framework throughout their enterprise?
Hurricane Katrina disaster area : Select a major organization that was located with a major natural disaster area, such as the Hurricane Katrina disaster area.
Can comply 3rd party requirements in law without a contract : You are the Lead Cybersecurity 3rd Party Auditor. Your company is subject to New York's Cybersecurity Requirements and Interagency Guidelines.
Yielded additional valuable information : What approaches could have yielded additional valuable information? What reference to research sources.
Calculate develetechs risk exposure in this area : Identified a risk to the availability of your file servers at peak traffic hours. How would you prefer to calculate Develetech's risk exposure in this area?
Why ethics is important for penetration testing : Why Ethics is important for Penetration Testing in the cyber domain. Select two examples from research on the Internet.
Digital government services created cybersecurity issues : How has the closure of physical offices for walk-in service and the shift to digital government services created cybersecurity issues,
Difference between a firewall-an intrusion detection system : Explain the difference between a Firewall, an Intrusion Detection System and an Intrusion Prevention System (IPS).
What is the profession of graphic processor improvements : What is the profession of graphic processor improvements? How has it differed from the path of CPU progression? What unique differences exist with GPUs?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe the type of trademark

Describe the type of trademark you own and how it is protected. What defenses or arguments do you have to use against the cybersquatter?

  Security framework or methodology

Without employing a security framework or methodology,

  Identify best practices for fixing vulnerabilities

Identify best practices for fixing vulnerabilities and insecure interactions as introduced by poor coding. Update your table of contents before submission.

  Discuss could use such a memory stick for transport

In particular, consider whether each of the malware propagation mechanisms we discuss could use such a memory stick for transport.

  Evidence collection and acquisition process

During your investigation, you discover that a set of Network Logs were mislabeled during the evidence collection/acquisition process.

  Security issues in cloud computing requirement

Security issues in Cloud Computing Requirement and Identify cloud security issues experienced with software-as-a-service - Brief write up on cloud computing

  COMP714 Advanced Network Technologies Question

COMP714 Advanced Network Technologies assignment help and solutions, Auckland University of Technology, assessment help - Develop a network model.

  Quality attribute-describes how well the system

A feature describes WHAT a system will do; a quality attribute describes HOW WELL the system does its features.

  Determine what the risk to an organisation is

Determine what the risk to an organisation is, you need to know what the problems could be - how it performs its attack and the mitigation strategies. The risk to an organisation using vulnerable systems should also be determined.

  What are the common characteristics of a bastion host

What are the common characteristics of a bastion host? What is a DMZ network and what types of systems would you expect to find on such networks?

  Discuss the big issue, namely privacy vs convenience

Discuss the big issue, namely privacy vs. convenience, from the perspective of marketing. What are the benefits? What are the ethical issues?

  Write a reflection report about the role cryptography

Determine what the risk to an organisation is, you need to know what the problems could be - Write a reflection report in 100 words about the role cryptography

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd