Determine the likelihood for potential vulnerability

Assignment Help Basic Computer Science
Reference no: EM133098315

Scenario

ABC Insurance Company is one of the largest insurance companies in U.S. It has several branches/agents across the nation. Their branches can communicate with the central company headquarters and with each other through computer network. Customer information and company sensitive data has to be protected at all times. ABC Insurance Company has database servers, J2EE application server, and web application server for its employers to access. It allows the customers to access insurance policy information, purchase, and change or cancel insurance policies online, and other services. The customers include individual policy holders and business policy holders.

The company employees and the customers need login accounts to access the company servers. The company adopts the JRA architecture for the log-in capability. This infrastructure has many components. Many of the components consist of active directories, web servers, and databases. Each of the JRA architectures has a Business to Enterprise connection which is internal, Business to Customers which is individual policy customers and Business to Business which is business customers with the insurance company. These connections are called realms. Each realm is located at a different physical location.

ABC Insurance Company holds customer information which is a valued asset to the company. The company has to ensure that this information is confidential to have the customers' trust. The company has to protect the customers' insurance policies which are the drive for the company's success. Agents' login credentials and data needs to be secure too.

A problem with ABC Insurance Company is the amount of hours needed to maintain the architecture. ABC Insurance Company wants a different way to implement this architecture. It was suggested to virtualize the JRA architecture. Virtualization can enable processes to share resources more efficiently. This would have different operating systems, web servers, and databases run on a virtual machine. Each realm would run on one machine as a virtual realm. This would cut down component costs, and cut down manpower to maintain the architecture. Two or more realms can run on one machine if they face the same kind of risks.

Case Objectives:

Identify the vulnerabilities involved in implementing a new technology. Refer to NIST RMF as you will need to include this plan for this assignment.

Determine the likelihood for a potential vulnerability.

Create a plan for Enterprise Governance, Risk and Compliance (eGRC) which shall also include a support plan.

Should include process integration for eGRC, workflows and enterprise change processes. For example, could look ServiceNow Enterprise Management platform.

Assess risk considering the likelihood of the occurrence of vulnerability, the information asset value, current controls and the uncertainty of current knowledge.

Determine the adverse impact resulting from a successful threat exercise of vulnerability.

Formulate a cost benefit analysis on adopting a new technology.

Assess risk level according to the likelihood of a vulnerability being exploited, and the impact of the vulnerability.

Recommend risk mitigation strategies for controlling risks.

Evaluate the risk mitigation strategies.

Describe Twofish and El Gamal

- Functions.

- Strengths and Weaknesses.

- Structure and processes.

- Alternatives besides tables to thwart timing attacks.

- Relevant examples of modern applications/industry that utilize each algorithm.

Reference no: EM133098315

Questions Cloud

Wireless mobile network : What are some things you need to think about when it comes to doing business globally, using a wireless mobile network?
What does architectural alignment entail : What does an architectural alignment entail? Provide three common risk mitigation strategies for handling the enterprise. What is BYOD? What is MDM?
Why is data mining popular today : How will it be done in the future? Will AI be a factor in potential job loss for analysts who hold data mining jobs in organizations today?
Create incident response plan : Create an incident response plan which is accompanied by a forensic plan please refer to NIST specifications.
Determine the likelihood for potential vulnerability : Determine the likelihood for a potential vulnerability. Determine the adverse impact resulting from a successful threat exercise of vulnerability.
Difference between plagiarism vs self-plagiarism : What is an Information Technology Project? Explain the difference between plagiarism vs self-plagiarism?
Digital divide : According to many, the digital world is being divided into ‘haves' and ‘have nots' - between those that have access and can use a computer and the Internet,
Discuss concept of quality of life : Discuss the concept of "quality of life." Elaborate on how Christian healthcare administrators might assure "quality of life" in healthcare delivery settings.
Regions corporate culture to usa corporate culture : Compare and contrast the company cultures you have experienced. compare and contrast your regions corporate culture to the USA corporate culture.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd