Record your new severity and likelihood ratings

Assignment Help Management Information Sys
Reference no: EM131493107

Information Security Risk Management Assignment

For this exercise, read the provided case study about AcmeHealth, and re-rate the risk exposure for each finding related to the following assets:

1. Code Repository
2. QA Server
3. Production Application Server

Assume that additional information has been provided below by the Subject Matter Experts during the qualification process. Be sure to note any findings where you are changing your original assessment of the risk level and why. Review the provided example as a guideline.

Like the last assignment, you will need to assess the severity of each violation and also the likelihood that it would cause a breach of security.

Use the severity and likelihood scales from Appendix B in the book (Tables 6.11 and 6.12) to evaluate each finding. A mapping table is provided (Figure 6.2) to calculate the Risk Exposure value for each severity/likelihood pair without taking sensitivity into account for now.

If you don't understand the technical details of any of the findings, please post questions to the Discussion Forum and ask the instructor to clarify.

You can turn in the assignment electronically through Blackboard.

Review each finding again, and assume that the following answers have been provided by the subject matter experts for that resource. Use these answers to provide a more informed assessment of the risk below:

Table 1 - Finding Qualification Updates

#

Resource

Finding

Qualification Answers

1

Code Repository

Resource administrators don't verify the integrity of the information resource patches through such means as comparisons of cryptographic ...

-  All updates are obtained directly from the vendor's site (IBM in this case for the AIX servers)
-  All patches are thoroughly tested in DEV, and QA environments before being installed on the Code Repository Server.

2

Code Repository

Network connections from the offshore developers' workstations to the code repository server are not encrypted.

-  Sessions to the server never expire
-  Password complexity is not enforced by the server
-  Connections from the offshore network to AcmeHealth's network is across a VPN
-  Some scripts containing passwords are stored in the code repository

3

QA Server

Client data is copied from production servers to this server regularly for QA testing.

-  Data is not stored encrypted on the QA Server
-  Developers have privileged access to the database in QA
-  The QA Server allows connections from the Internet to simulate client traffic and performance testing

4

Production Application Server

No one notifies the Help Desk of terminations for support personnel in order to ensure that their access is disabled.

-  Administrative interfaces can only be accessed from the internal network
-  Server audit logs are retained on a separate SEIM infrastructure
-  Accounts that aren't used for 180 days are automatically disabled
-  Both the application and databases servers are behind firewalls

Please note that you are reassessing these findings. Finding 1 is provided as an example.

Record your new severity and likelihood ratings and justifications below, being sure to note if the overall risk rating for the finding has changed now that you have more information. An example for the first finding has been provided:

Finding 1:

Severity: High Justification: The potential severity of this risk has not changed. If malicious code is allowed onto the system through an application patch, this could compromise that application potentially allowing backdoor access to attackers or allow sensitive data to be sent from the application to the attackers. The malicious code may also cause the application to be unstable, causing it to crash periodically.

Likelihood: Negligible Justification: The potential likelihood of this risk has been lowered from Low to Negligible, because patches are always obtained from a credible and trusted source (the vendor is IBM in one case), and all patches are tested thoroughly in both the Development and QA environments before being applied to more sensitive Code Repository Server. Although it is possible for attackers to place fake application patch updates on sites that look legitimate, for most commercial software this would be more difficult and the attacker would have to be very motivated and have a high level of skill. Even if the attacker was able to compromise the vendor's server, the malicious patch would likely be discovered during DEV or QA testing before it reached the Code Repository server.

Risk: Low Justification: The overall risk of system or data compromise through a maliciously crafted patch update has not changed. It is still very unlikely that a malicious update would be applied to the Code Repository server without being detected first. If one were to take it past the several layers of control, this could put the server in jeopardy of being controlled by an outside attacker. In this case, an attacker could modify the code to put backdoors into the production application, or more likely the proprietary code could be stolen.

Finding 2:

Severity: ________________ Justification: ______________
Likelihood: ________________ Justification: _____________
Risk: ________________ Justification: _________________

Finding 3:

Severity: ________________ Justification: ______________

Likelihood: ________________ Justification: _____________

Risk: ________________ Justification: _________________

Finding 4:
Severity: ________________ Justification: ______________

Likelihood: ________________ Justification: _____________

Risk: ________________ Justification: _________________

Reference no: EM131493107

Questions Cloud

Explain the low benefit and cost of pollution control : Assume there are two types of communities in the US, those in which there is a high benefit of pollution control and a high cost of pollustion control.
Summarise the risky assets risk return profile : Calculate for each asset whether it provides an excess return. You will need to determine firstly its expected value and then compare it to its estimated CAPM figure.
Annual coupon payment : Consider a 7 year bond with a face value of $1,000 and with an annual coupon payment of $100. What is the market value of this bond if the appropriate required.
What is the level of equilibrium income : Suppose that the behavior of households and firms in an economy is determined by the following equations.
Record your new severity and likelihood ratings : Record your new severity and likelihood ratings and justifications below, being sure to note if the overall risk rating for the finding has changed.
What are the ethical issues related to the competency : What are the ethical issues related to the competency and decision-making capacity of the client while making the health care decisions
Watch the video titled fruit guys - strategy : Watch the video titled "Fruit Guys - Strategy," located in Week 3 of your Blackboard course. Identify two or three (2-3) businesses.
Identify the market structure of building industry : Explain the differences and common features between oligopoly and monopoly using the key characteristic of market structures.
Calculate the number of shares : Hughes also paid legal and other administrative costs of $1.75 million for the IPO.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd