Identify constraints on the conduct of risk assessment

Assignment Help Basic Computer Science
Reference no: EM133046979

TransCon needs to have an understanding of the risks associated with the New Organisational Management System (NOMS) being developed and implemented across the organization. You have been consulted to provide an evaluation of contemporary cyber security risk management approaches and recommend the most appropriate for Transcon based on your analysis. Once you have justified the selection of your approach you will perform risk identification for Transcon.

Instructions
Assessment Task 2 - Template

[Insert Document Title Here]

{This document has been provided as a template to complete assessment task 2.

Use the SecureWorx SAD (Solution Architecture Document) New Organisational Management System Version 100 to complete this assessment task.}

[Insert Brief Document Introduction Here]

Question 1. Study the NIST document on Risk Management 800-39:

Answer the following questions:

i. Frame the risk for the Transcon corporation based upon the SecureWorx SAD document that you had previously studied for assessment 1.
a. The risk frame must comprise 3 assets that you have identified, a threat posed to each of these assets, the corresponding vulnerabilities (between 1-3), consequences of the threat and likelihood determination.
b. Identify the source of each of the threats from (a)
c. Identify constraints on the conduct of risk assessment, response and risk monitoring activities (4 constraints all together explained in 1 line each).
ii. Identify the risk to privacy of Transcon data, and propose a risk monitoring strategy in 200 words to contain this risk.

Question 2. Illustration of assets, threats, impacts and controls that apply to the provided scenario.

(i) Identification of Transcon's 4 priority assets; Use section ‘5 Solution Architecture' or section ‘6 Infrastructure Components' of the SAD to determine assets. Clearly state where these assets are referred to in the SAD using the asset classification table. Then you will need to act on behalf of Transcon as the asset owner to classify these for Transcon to complete the table.

(ii) Apply Weighted Factor Analysis (WFA) to determine relative value of Transcon assets.
Use table 2 to list Transcon assets to be prioritized.
Calculate relative importance of each asset using WFA
Criteria, weights and impacts on which to prioritise the assets are as follows:
• Criteria: Revenues, Profitability, Reputation.
• Relative weight of each criteria: 30%, 30% and 40%.
• Impact: Consequences that would result (for each criteria) if the asset were compromised - assign each information asset a score of between 0.1 and 1.0 for each criterion.

(iii) Perform Threat identification
Identify a maximum of 4 threats for each of the assets and determine the category each threat belongs to using slide 39 of Week 4 Lecture.

(iv) Perform Vulnerability identification
Identify one vulnerability for each threat from table 4 and record in table 5 to complete TVA worksheet.

Attachment:- Assessment Task Template.rar

Reference no: EM133046979

Questions Cloud

Understanding of the consumer and business behaviour : Explain in your own words how better understanding of the consumer and business behaviour benefits the Canadian businesses?
Determine amount of ocean city kite company fixed costs : Ocean City Kite Company manufactures & sells kites for $7.50 each. Determine the dollar amount of Ocean City Kite Company's fixed costs
How to use financial calculator to solve question : You buy a townhouse in Penrith for $850,000 and expect to get a return on investment of 6.5% p.a effective.
Images and descriptions communicate god grandeur : Gerard Manley Hopkins (1844-89) was ordained a Jesuit priest. His poetry is considered "modern" for its experiments in meter and sound, but his ideas are classi
Identify constraints on the conduct of risk assessment : Identify constraints on the conduct of risk assessment, response and risk monitoring activities (4 constraints all together explained in 1 line each)
Discuss the potential implications of the issues : You are the Underwriting Manager for a UK-based general insurer. The insurer has a number of delegated underwriting authorities with a range of coverholders.
What is the expected return of your portfolio : You have invested 30 percent of your portfolio in Jacob, Inc., 40 percent in Bella Co., and 30 percent in Edward Resources. What is the expected return
A business case-royal gloves inc : Develop a set of Marketing Objectives that Royal Gloves will use as the base of its new campaign to increase the performance of its product.
What is the npv of this project : The cost of the manufacturing equipment is $1,750,000. Given the company's required rate of return of 15 percent, what is the NPV of this project

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd