Improvement and risk mitigation strategies associated to fdl

Assignment Help Computer Network Security
Reference no: EM132148078

SECURITY RISK ASSESSMENT

Executive Summary

A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018.

FDL, an ATH group company, is a Directory Listing Service Provider who is responsible for printing the yearly Yellow Pages Fiji Directory as well as maintaining a web accessible search engine.

The Assessment outlined some high risk finding in the area of Computer Security risks in terms of lack of email, computer, and network security measures.

To mitigate these risks, Management need to have appropriate measures on all computing related security risks. For email security, install a security gateway such as Barracuda. Implement a Firewall for network security e.g Fortigate and for computer security, install heavy-duty antivirus software such as ESET.

Purpose

The main purpose of this risk assessment report is to basically identify and outline all threats, weaknesses and vulnerabilities in regards to Fiji Directories Limited (FDL).

This assessment report will then be used to outing all areas of improvement and risk mitigation strategies associated to FDL.

FDL is a potential high-risk organization as it hosts one of the largest databases in Fiji with customer data, business and individual with the added advantage of having accurate and timely data.

4. Vulnerability Statement

[Compile and list potential vulnerabilities applicable to the system assessed].

Vulnerability Description
[List vulnerabilities] [Describe vulnerability and its impact]

5. Threat Statement

[Compile and list the potential threat-sources applicable to the system assessed].

Threat-Source Threat Actions
[List threat sources] [List and/or describe actions that can be taken by threat source e.g., identity theft, spoofing, system intrusion]

6. Risk Assessment Results

[List the observations (vulnerability/threat-source pairs). Each observation should include-
- Observation number and brief description of observation (e.g., Observation 1: User system passwords can be guessed or cracked)
- A discussion of the threat-source and vulnerability pair
- Identification of existing mitigating security controls
- Likelihood discussion and evaluation (e.g., High, Medium, or Low likelihood)
- Impact analysis discussion and evaluation (e.g., High, Medium, or Low impact)
- Risk rating based on the risk-level matrix (e.g., High, Medium, or Low risk level)
- Recommended controls or alternative options for reducing the risk].

Note: Need section 4,5 and 6 complete

Attachment:- Assignment Report.rar

Reference no: EM132148078

Questions Cloud

What is the sample size for studies with moe : What is the sample size for studies with MOE of +/-3.5% and +/-2.8%, with a confidence level of 95%, sample statistics of 50.
Describe the two methods used to access the tunnels : What is the SPF cost from R1 to R4 and Show your calculation - What is the cost from R5 to R2? Show your calculation. Submit your answer as Q14.pdf
What team leader management style would be most effective : As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill.
Is it economically better to make or buy the component : A lot of factors play an important role when it comes to planning and implementing. All these factors play a key role in project management.
Improvement and risk mitigation strategies associated to fdl : Purpose of this risk assessment report is to basically identify and outline all threats, weaknesses and vulnerabilities in regards to Fiji Directories Limited
What is the sample size for studies with moe : What is the sample size for studies with MOE of +/-3.5% and +/-2.8%, with a confidence level of 95%, sample statistics of 50.
Simple random sample of consumers : She would like to conduct a simple random sample of consumers interested in using the services of the company. She thinks that a sample of 750 would be plenty.
What is the sample size for studies with moe : What is the sample size for studies with MOE of +/-3.5% and +/-2.8%?, with a confidence level of 95%, sample statistics of .50? Please show work.
Charge of designing and running this research study : So, your supervisor wants to know if men and women differ in their response to the company's advertising. You are in charge of designing and running

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the common characteristics of a bastion host

What are the common characteristics of a bastion host? What is a DMZ network and what types of systems would you expect to find on such networks?

  Reduce the temptation to become a hacker

Most hackers start their careers breaking into computer systems as teenagers. - What can we as a community of computer professionals do to reduce the temptation to become a hacker?

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company

  Security risks associated with social networking sites

Discusses the security risks associated with social networking sites

  What advice do you have for the project manager

How likely does it seem that Pete will achieve his desired goals of being on time and within budget if nothing is done?

  Difference between perception and reputation

Discuss the difference between perception and reputation and explain how can organizational perception affect IT reputation?

  How rsa asymmetric and aes symmetric encryptions work

Data encryption is one of the main techniques used in network security. With the aid of diagrams, show how RSA Asymmetric and AES Symmetric encryptions work.

  Discuss about the public-key encryption

This Topic which covers the basic principles of encryption and many different types of encryption, explaining about each and every encryption in details.

  Explain rationale for physical topographical layout

Explain the rationale for the logical and physical topographical layout of the planned network. Create a comprehensive security policy.

  Why is the file kept inaccessible to the web server

Why is the file kept inaccessible to the Web server? Discuss this issue, but assume that the attacker is on the internal network.

  Openpgp-compliant email software package on your computer

Install an OpenPGP-compliant email software package on your computer, like any of the ones found at the OpenPGP Alliance (n.d.) Web site or any product in compliance with RFC 4880

  Concepts of information systems security as applied to an it

concepts of information systems security as applied to an IT infrastructure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd