Determine the likelihood for potential vulnerability

Assignment Help Basic Computer Science
Reference no: EM133104537

Scenario

ABC Insurance Company is one of the largest insurance companies in U.S. It has several branches/agents across the nation. Their branches can communicate with the central company headquarters and with each other through computer network. Customer information and company sensitive data has to be protected at all times. ABC Insurance Company has database servers, J2EE application server, and web application server for its employers to access. It allows the customers to access insurance policy information, purchase, and change or cancel insurance policies online, and other services. The customers include individual policy holders and business policy holders.

The company employees and the customers need login accounts to access the company servers. The company adopts the JRA architecture for the log-in capability. This infrastructure has many components. Many of the components consist of active directories, web servers, and databases. Each of the JRA architectures has a Business to Enterprise connection which is internal, Business to Customers which is individual policy customers and Business to Business which is business customers with the insurance company. These connections are called realms. Each realm is located at a different physical location.

ABC Insurance Company holds customer information which is a valued asset to the company. The company has to ensure that this information is confidential to have the customers' trust. The company has to protect the customers' insurance policies which are the drive for the company's success. Agents' login credentials and data needs to be secure too.

A problem with ABC Insurance Company is the amount of hours needed to maintain the architecture. ABC Insurance Company wants a different way to implement this architecture. It was suggested to virtualize the JRA architecture. Virtualization can enable processes to share resources more efficiently. This would have different operating systems, web servers, and databases run on a virtual machine. Each realm would run on one machine as a virtual realm. This would cut down component costs, and cut down manpower to maintain the architecture. Two or more realms can run on one machine if they face the same kind of risks.

Case Objectives:

Identify the vulnerabilities involved in implementing a new technology. Refer to NIST RMF as you will need to include this plan for this assignment.

Determine the likelihood for a potential vulnerability.

Create a plan for Enterprise Governance, Risk and Compliance (eGRC) which shall also include a support plan.

Should include process integration for eGRC, workflows and enterprise change processes. For example, could look ServiceNow Enterprise Management platform.

Assess risk considering the likelihood of the occurrence of vulnerability, the information asset value, current controls and the uncertainty of current knowledge.

Determine the adverse impact resulting from a successful threat exercise of vulnerability.

Formulate a cost benefit analysis on adopting a new technology.

Assess risk level according to the likelihood of a vulnerability being exploited, and the impact of the vulnerability.

Recommend risk mitigation strategies for controlling risks.

Evaluate the risk mitigation strategies.

- Describe Twofish and El Gamal

o Functions

o Strengths and Weaknesses

o Structure and processes

o Alternatives besides tables to thwart timing attacks

o Relevant examples of modern applications/industry that utilize each algorithm.

Reference no: EM133104537

Questions Cloud

Wireless mobile network : We're looking at wireless networks, mostly focusing on mobile networks. Mobile networks in a global economy can be a challenge for multiple reasons.
About displacement of workers from this outcome : Why is data mining so popular today and how will it be done in the future? what we should do about displacement of workers from this outcome.
Servant-leaders in disciplines and communities : Students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities,
Identify the vulnerabilities : Create an incident response plan which is accompanied by a forensic plan please refer to NIST specifications. Identify the vulnerabilities.
Determine the likelihood for potential vulnerability : Determine the likelihood for a potential vulnerability. Determine the adverse impact resulting from a successful threat exercise of vulnerability.
Big data analytics tools : Assess modern data analytical tools that exist in the industry today. A variety of modern tools for big data analytics exist in the market today.
Digital divide : According to many, the digital world is being divided into ‘haves' and ‘have nots' - between those that have access and can use a computer and the Internet,
Product evaluation is important step : Product evaluation is an important step to ensure that a product will meet the quality, features, and overall design that is acceptable to the consumer.
Acquire digital certificate : Determine how much it will cost your company to acquire a digital certificate and the kinds of information you must provide to the certificate authority.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How does culture impact leadership

Discuss what organizational culture is and how it impacts work productivity. How does culture impact leadership?

  Designing team and team identity

Designing Team and Team Identity. Read at least 6 academically reviewed articles on designing.

  Considerations for enterprise system integration

Research important considerations for enterprise system integration. Compile a list of 5-7 categories of considerations, and discuss how they will be handled in the integration project.

  Sql queries using mysql

Query1 Write a SQL statement to display the course numbers of classes taught by Hammett Glenn. Query2 Write a SQL statement to display the course names of the courses taught by an instructor whose id is 415. Query3 Write a query to display the name ..

  Find the distance from the balloon to the soccer fields

To the right side of the balloon, the balloonist measures the angle of depression to the high school football field to be 62° 30'. The distance between the two athletic complexes is 4 miles.

  Computer architecture is the combination of software and

computer architecture is the combination of software and hardware that is organized in such a fashion as to deliver the

  Explain the role of confidence in the pegged

Explain the role of 'confidence' in the pegged/floating exchange rate system.

  What is the quad representation of the decimal number 42

We have represented numbers in base-2 (binary) and in base-16 (hex). We are now ready for unsigned base-4, which we will call quad numbers. A quad digit can be 0, 1, 2, or 3.

  Element of negligence is at the center

Which element of negligence is at the center of this dispute? How is a court likely to rule in this case, and why?

  Project management of a data warehouse

What are the unique challenges for project management of a data warehouse project vs. a traditional IT project?

  What types of trees are used for most structural lumber

Design values and adjustment factors in the following problems are to be taken from the 1997 NDS. Assume wood will be used in dry-service conditions and at normal temperatures unless otherwise noted.

  Systems development life cycle

Define the Systems Development Life Cycle. Define the concept of Organizations as Systems.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd