Discuss risk treatment plan

Assignment Help Basic Computer Science
Reference no: EM131577491

Question: Assessment item 1 Threat and Risk Assessment Report Task Write a Threat and Risk Assessment...

Assessment item 1 Threat and Risk Assessment Report Task Write a Threat and Risk Assessment Report that assesses the findings of a gap analysis and articulates the most prominent risks and threats to the subject organisation - EvolveNet. The audience of the Threat and Risk Assessment Report is the SLT and Executive team of the target organisation and should be authored to a professional standard as would be expected in typical large organisation. The report must include o An assessment of the control gaps identified in the gap analysis report (provided) and risk presented to the organisation o Possible threat scenarios that the organisation is subject to due to the identified gaps o A list of prioritised short-term (tactical) and long-term (strategic) initiatives to address the identified risks o A copy of the threat matrix used for risk level rating A suggested heading structure is provided below

1. Executive Summary

2. Introduction

3. Organisational Assets

4. Threat Categories

5. Vulnerabilities and Threats (table including: vulnerabilities, threat scenarios, likelihood, impact, risk level)

6. Risk Treatment Plan (table including, recommended controls, vulnerabilities addressed, priority, owner)

7. Risk rating matrix Organisational Overview EvolveNet is an Australian VOIP company that supplies over-the- top VOIP services for residential and businesses customers.

Our key product is the the AnyPhone VOIP service that allows customers to make low-cost phone calls across the globe. Additional services include GlobalPhone, which provides a local phone number in 20 different countries. As a world leader, EvolveNet provides the VOIP platform for over 50 domestic and global telecommunication partners. EvolveNet provides a reliable, easily-to-configure, plug and play VOIP service.

Key Information Assets and Systems

- Customer database (~300,000 records)

- Call records (2,000,000 records per day)

- Internet-facing servers (website server, webmail, email, web service, DNS server)

- Internal servers (file, print, intranet, corporate PBX, DHCP and DNS servers)

- Self-service VOIP configuration website

- Web development and test systems

- Wholesale

- Customer-facing PBX and voicemail farm

- Staff workstations and laptops

- VPN concentrator

- Network routers and switches for corporate network

- Boarder and DMZ firewall

- EvolveNet Strategy

Reference no: EM131577491

Questions Cloud

Four functions of management : There are four functions of management: Planning, Organizing, Leading, and Controlling. For this question, outline how managers.
Calculate the total-spending function : Indicate on the graph the effect of an N$300 million increase in investment spending and comment on the magnitude of change in the equilibrium income relative.
Piece of real state that black inherited : Black, a minor, sells a piece of real state that Black inherited. Black spends the money rather foolishly and, by the time of adulthood, Black is deeply in debt
Piece of real state that black inherited : Black, a minor, sells a piece of real state that Black inherited. Black spends the money rather foolishly and, by the time of adulthood, Black is deeply in debt
Discuss risk treatment plan : Assessment item 1 Threat and Risk Assessment Report Task Write a Threat and Risk Assessment Report that assesses the findings of a gap analysis and articulates.
Why are competitive markets more efficient : Why are competitive markets more efficient? please explain hows no restriction to entry and exist affect the competitive market?
Total interest will you end up paying over the life of loan : how much total interest will you end up paying over the life of the loan?
Analyze the deviance using terms such as primary deviance : Analyze the deviance, using terms such as primary deviance, secondary deviance, retrospective labeling, and stigma.
Burden of principal repayment by spreading : Which of the following possible provisions of a bond indenture is designed to ease the burden of principal repayment by spreading it out over several years?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd