Improvement and risk mitigation strategies associated to fdl

Assignment Help Computer Network Security
Reference no: EM132148078

SECURITY RISK ASSESSMENT

Executive Summary

A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018.

FDL, an ATH group company, is a Directory Listing Service Provider who is responsible for printing the yearly Yellow Pages Fiji Directory as well as maintaining a web accessible search engine.

The Assessment outlined some high risk finding in the area of Computer Security risks in terms of lack of email, computer, and network security measures.

To mitigate these risks, Management need to have appropriate measures on all computing related security risks. For email security, install a security gateway such as Barracuda. Implement a Firewall for network security e.g Fortigate and for computer security, install heavy-duty antivirus software such as ESET.

Purpose

The main purpose of this risk assessment report is to basically identify and outline all threats, weaknesses and vulnerabilities in regards to Fiji Directories Limited (FDL).

This assessment report will then be used to outing all areas of improvement and risk mitigation strategies associated to FDL.

FDL is a potential high-risk organization as it hosts one of the largest databases in Fiji with customer data, business and individual with the added advantage of having accurate and timely data.

4. Vulnerability Statement

[Compile and list potential vulnerabilities applicable to the system assessed].

Vulnerability Description
[List vulnerabilities] [Describe vulnerability and its impact]

5. Threat Statement

[Compile and list the potential threat-sources applicable to the system assessed].

Threat-Source Threat Actions
[List threat sources] [List and/or describe actions that can be taken by threat source e.g., identity theft, spoofing, system intrusion]

6. Risk Assessment Results

[List the observations (vulnerability/threat-source pairs). Each observation should include-
- Observation number and brief description of observation (e.g., Observation 1: User system passwords can be guessed or cracked)
- A discussion of the threat-source and vulnerability pair
- Identification of existing mitigating security controls
- Likelihood discussion and evaluation (e.g., High, Medium, or Low likelihood)
- Impact analysis discussion and evaluation (e.g., High, Medium, or Low impact)
- Risk rating based on the risk-level matrix (e.g., High, Medium, or Low risk level)
- Recommended controls or alternative options for reducing the risk].

Note: Need section 4,5 and 6 complete

Attachment:- Assignment Report.rar

Reference no: EM132148078

Questions Cloud

What is the sample size for studies with moe : What is the sample size for studies with MOE of +/-3.5% and +/-2.8%, with a confidence level of 95%, sample statistics of 50.
Describe the two methods used to access the tunnels : What is the SPF cost from R1 to R4 and Show your calculation - What is the cost from R5 to R2? Show your calculation. Submit your answer as Q14.pdf
What team leader management style would be most effective : As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill.
Is it economically better to make or buy the component : A lot of factors play an important role when it comes to planning and implementing. All these factors play a key role in project management.
Improvement and risk mitigation strategies associated to fdl : Purpose of this risk assessment report is to basically identify and outline all threats, weaknesses and vulnerabilities in regards to Fiji Directories Limited
What is the sample size for studies with moe : What is the sample size for studies with MOE of +/-3.5% and +/-2.8%, with a confidence level of 95%, sample statistics of 50.
Simple random sample of consumers : She would like to conduct a simple random sample of consumers interested in using the services of the company. She thinks that a sample of 750 would be plenty.
What is the sample size for studies with moe : What is the sample size for studies with MOE of +/-3.5% and +/-2.8%?, with a confidence level of 95%, sample statistics of .50? Please show work.
Charge of designing and running this research study : So, your supervisor wants to know if men and women differ in their response to the company's advertising. You are in charge of designing and running

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd