Discuss risk treatment plan

Assignment Help Basic Computer Science
Reference no: EM131577491

Question: Assessment item 1 Threat and Risk Assessment Report Task Write a Threat and Risk Assessment...

Assessment item 1 Threat and Risk Assessment Report Task Write a Threat and Risk Assessment Report that assesses the findings of a gap analysis and articulates the most prominent risks and threats to the subject organisation - EvolveNet. The audience of the Threat and Risk Assessment Report is the SLT and Executive team of the target organisation and should be authored to a professional standard as would be expected in typical large organisation. The report must include o An assessment of the control gaps identified in the gap analysis report (provided) and risk presented to the organisation o Possible threat scenarios that the organisation is subject to due to the identified gaps o A list of prioritised short-term (tactical) and long-term (strategic) initiatives to address the identified risks o A copy of the threat matrix used for risk level rating A suggested heading structure is provided below

1. Executive Summary

2. Introduction

3. Organisational Assets

4. Threat Categories

5. Vulnerabilities and Threats (table including: vulnerabilities, threat scenarios, likelihood, impact, risk level)

6. Risk Treatment Plan (table including, recommended controls, vulnerabilities addressed, priority, owner)

7. Risk rating matrix Organisational Overview EvolveNet is an Australian VOIP company that supplies over-the- top VOIP services for residential and businesses customers.

Our key product is the the AnyPhone VOIP service that allows customers to make low-cost phone calls across the globe. Additional services include GlobalPhone, which provides a local phone number in 20 different countries. As a world leader, EvolveNet provides the VOIP platform for over 50 domestic and global telecommunication partners. EvolveNet provides a reliable, easily-to-configure, plug and play VOIP service.

Key Information Assets and Systems

- Customer database (~300,000 records)

- Call records (2,000,000 records per day)

- Internet-facing servers (website server, webmail, email, web service, DNS server)

- Internal servers (file, print, intranet, corporate PBX, DHCP and DNS servers)

- Self-service VOIP configuration website

- Web development and test systems

- Wholesale

- Customer-facing PBX and voicemail farm

- Staff workstations and laptops

- VPN concentrator

- Network routers and switches for corporate network

- Boarder and DMZ firewall

- EvolveNet Strategy

Reference no: EM131577491

Questions Cloud

Four functions of management : There are four functions of management: Planning, Organizing, Leading, and Controlling. For this question, outline how managers.
Calculate the total-spending function : Indicate on the graph the effect of an N$300 million increase in investment spending and comment on the magnitude of change in the equilibrium income relative.
Piece of real state that black inherited : Black, a minor, sells a piece of real state that Black inherited. Black spends the money rather foolishly and, by the time of adulthood, Black is deeply in debt
Piece of real state that black inherited : Black, a minor, sells a piece of real state that Black inherited. Black spends the money rather foolishly and, by the time of adulthood, Black is deeply in debt
Discuss risk treatment plan : Assessment item 1 Threat and Risk Assessment Report Task Write a Threat and Risk Assessment Report that assesses the findings of a gap analysis and articulates.
Why are competitive markets more efficient : Why are competitive markets more efficient? please explain hows no restriction to entry and exist affect the competitive market?
Total interest will you end up paying over the life of loan : how much total interest will you end up paying over the life of the loan?
Analyze the deviance using terms such as primary deviance : Analyze the deviance, using terms such as primary deviance, secondary deviance, retrospective labeling, and stigma.
Burden of principal repayment by spreading : Which of the following possible provisions of a bond indenture is designed to ease the burden of principal repayment by spreading it out over several years?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Large number of networks

The Internet is made up of a large number of networks. Their arrangement determines the topology of the Internet. A considerable amount of information about the Internet topology is available on line.

  Create own version of either a hiring or termination policy

What clauses should a termination policy contain to prevent disclosure of an organization's information? Create your own version of either a hiring or termination policy

  What is the stock required rate of return

What is the stock's required rate of return according to CAPM? What is the stock's present market price per share, assuming this required return?

  What relative accuracy of a''s and b''s clocks is required

What relative accuracy of the sender's and receiver's clocks is required in order to receive correctly 48 0 bytes (one ATM AAL5 cell's worth) in a row?

  Why was using sap hana so helpful

How did Unilever's new systems improve operations and management decision making? Give two examples.

  Count the occurrences of string

$MyGrep -c "This is a list of words" test.txt Count the occurrences of string "This is a list of words" in the content of file test.txt

  Generate normally distributed random numbers

The polar method can be used to generate normally distributed random number in the range 0 to 1. It involves first generating two uniform random numbers r1 and r2. Then if the expression for d below is ≥1 two normally distributed random numbers can..

  Proposals according to a standard format

Why would a customer give contractors instructions in the RFP to submit their proposals according to a standard format?

  Advantages and disadvantages of grassroots computing

Discuss how grassroots computing changes the way software is designed, developed, tested, and maintained in a typical organization. What are the advantages and disadvantages of grassroots computing?

  Develop data dictionary entries for a process

Use a CASE tool or a manual procedure to develop data dictionary entries for a process, data flow, data store, and data structure based on the data flow diagrams for any transport agency. As a group, agree on any assumptions necessary to make comp..

  Define a new 8-bit floating point format with 1 sign bit

Define a new 8-bit floating point format with 1 sign bit, 4 bits of exponent, using an excess-7 code (that is, the bias is 7), and 3 bits of fraction. If xE5 is the bit pattern for a number in this 8-bit floating point format, what value does it h..

  Write some matlab statements on the command line

Write some MATLAB statements on the command line which use logical vectors to count how many elements of a vector x are negative, zero, or positive.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd