Identify constraints on the conduct of risk assessment

Assignment Help Basic Computer Science
Reference no: EM133046979

TransCon needs to have an understanding of the risks associated with the New Organisational Management System (NOMS) being developed and implemented across the organization. You have been consulted to provide an evaluation of contemporary cyber security risk management approaches and recommend the most appropriate for Transcon based on your analysis. Once you have justified the selection of your approach you will perform risk identification for Transcon.

Instructions
Assessment Task 2 - Template

[Insert Document Title Here]

{This document has been provided as a template to complete assessment task 2.

Use the SecureWorx SAD (Solution Architecture Document) New Organisational Management System Version 100 to complete this assessment task.}

[Insert Brief Document Introduction Here]

Question 1. Study the NIST document on Risk Management 800-39:

Answer the following questions:

i. Frame the risk for the Transcon corporation based upon the SecureWorx SAD document that you had previously studied for assessment 1.
a. The risk frame must comprise 3 assets that you have identified, a threat posed to each of these assets, the corresponding vulnerabilities (between 1-3), consequences of the threat and likelihood determination.
b. Identify the source of each of the threats from (a)
c. Identify constraints on the conduct of risk assessment, response and risk monitoring activities (4 constraints all together explained in 1 line each).
ii. Identify the risk to privacy of Transcon data, and propose a risk monitoring strategy in 200 words to contain this risk.

Question 2. Illustration of assets, threats, impacts and controls that apply to the provided scenario.

(i) Identification of Transcon's 4 priority assets; Use section ‘5 Solution Architecture' or section ‘6 Infrastructure Components' of the SAD to determine assets. Clearly state where these assets are referred to in the SAD using the asset classification table. Then you will need to act on behalf of Transcon as the asset owner to classify these for Transcon to complete the table.

(ii) Apply Weighted Factor Analysis (WFA) to determine relative value of Transcon assets.
Use table 2 to list Transcon assets to be prioritized.
Calculate relative importance of each asset using WFA
Criteria, weights and impacts on which to prioritise the assets are as follows:
• Criteria: Revenues, Profitability, Reputation.
• Relative weight of each criteria: 30%, 30% and 40%.
• Impact: Consequences that would result (for each criteria) if the asset were compromised - assign each information asset a score of between 0.1 and 1.0 for each criterion.

(iii) Perform Threat identification
Identify a maximum of 4 threats for each of the assets and determine the category each threat belongs to using slide 39 of Week 4 Lecture.

(iv) Perform Vulnerability identification
Identify one vulnerability for each threat from table 4 and record in table 5 to complete TVA worksheet.

Attachment:- Assessment Task Template.rar

Reference no: EM133046979

Questions Cloud

Understanding of the consumer and business behaviour : Explain in your own words how better understanding of the consumer and business behaviour benefits the Canadian businesses?
Determine amount of ocean city kite company fixed costs : Ocean City Kite Company manufactures & sells kites for $7.50 each. Determine the dollar amount of Ocean City Kite Company's fixed costs
How to use financial calculator to solve question : You buy a townhouse in Penrith for $850,000 and expect to get a return on investment of 6.5% p.a effective.
Images and descriptions communicate god grandeur : Gerard Manley Hopkins (1844-89) was ordained a Jesuit priest. His poetry is considered "modern" for its experiments in meter and sound, but his ideas are classi
Identify constraints on the conduct of risk assessment : Identify constraints on the conduct of risk assessment, response and risk monitoring activities (4 constraints all together explained in 1 line each)
Discuss the potential implications of the issues : You are the Underwriting Manager for a UK-based general insurer. The insurer has a number of delegated underwriting authorities with a range of coverholders.
What is the expected return of your portfolio : You have invested 30 percent of your portfolio in Jacob, Inc., 40 percent in Bella Co., and 30 percent in Edward Resources. What is the expected return
A business case-royal gloves inc : Develop a set of Marketing Objectives that Royal Gloves will use as the base of its new campaign to increase the performance of its product.
What is the npv of this project : The cost of the manufacturing equipment is $1,750,000. Given the company's required rate of return of 15 percent, what is the NPV of this project

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Can the two trees be completely disjointed

Give an example of a weighted connected graph G = (V,E) and a vertex v, such that the minimum spanning tree of G is the same as the shortest-path spanning tree rooted at v.

  Data security is todays top priority

Data Security is todays top priority. Encryption is an effective tool to keep the information confidential. For an encryption system to work properly,

  Discuss how a product life-cycle

Discuss how a product's life-cycle can impact the buy/make aspect of the supply chain (refer to Section 9.3 in your text). Are there different times/phases in a product life-cycle when it would make sense to change from a buy/make aspect to an out..

  Program that will input two arrays of information

Write a program that will input two arrays of information. Each array will contain exactly 4 floating point values.

  It professional to support database reporting functionality

Suppose you have been hired as an IT professional to support database reporting functionality for a Human Resources system. Compose at least two aggregate function queries that can be useful for the executives of the organization to extract summa..

  Create an instance of class image viewer

Open the imageviewer0-1 project. (This will become the basis of your own image viewer.) Create an instance of class Image Viewer. Resize the resulting frame (make it larger). What do you observe about the placement of the text in the frame?

  Network management strategy

Explain the role of network management. Describe at least three tools used for network management.

  Human resource management strategic role

Explain how key HR functions support the selected organization's strategy. Include recruitment, retention, total rewards, performance management, and employment law in your analysis. Analyze human resource management's strategic role in the selecte..

  Downward sloping demand curve

Assume that you are managing a monopoly. Your monopoly faces a downward sloping demand curve described by the equation P = 85 - 5Q.

  Three integers and returns a list of the statistic

Make a function statistic(list_of int) that takes as input a list of (exactly) three integers and returns a list of the following statistics: sum, average value

  Data analytics lifecycle

There are six phases in the data analytics lifecycle.

  Oracle SQL Developer Documentation

You will use SQL Developer as the primary tool to write PL/SQL code. Hence, it is important for you to get familiar with the tool.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd