Reference no: EM133663804
Assignment: IS Security and Risk Management
Overview
Write a report to discuss recent types of information security attacks, protection mechanisms and risk management.
Approach Analysis
You are required to choose one of the data breaches from the list above in Table 1 and create a report on it. Your report must include the following information.
A. Detail of the Attack:
This section of your report should include the elements below.
1. What was the attack? What vulnerability was exploited?
2. Was the vulnerability already known? When did it happen?
3. Were there any controls implemented against the vulnerability and yet it was exploited?
B. Analysis and Action:
This section of your report should include the elements below.
1. When and how did the target figure out about the attack?
2. For how long, the risk was not actioned?
3. Did the organisation have a risk assessment policy and procedure?
4. Did the organisation maintain a risk register?
5. Was the vulnerability included in the risk register?
6. How was the risk perceived (critical/non-critical/high/medium/low)?
7. What the attacker(s) did, stole, and wanted?
8. Did the organisation pay anything because of the attack?
9. What action did they adopt to avoid further damage?
C. Risk assessment
1. Risk Identification
2. Risk Analysis
3. Risk Evaluation
Risk Identification and Assessment
In this section, you need to identify risks and conduct an analysis of the selected use case. Regarding the selected scenario, reasonable assumptions can be made if they are adequately documented and supported. To perform risk identification and analysis, you can choose either of the following tools or a combination of them.
1. Factors Analysis in Information Risk (FAIR)
2. NIST Privacy Risk Assessment Methodology (PRAM)
3. NIST CyberSecurity Framework (CSF)
Description
Assume you have been recruited as a cybersecurity specialist by the client organization (the use case you chose). You are responsible for conducting a security risk assessment and preparing this report for the board members. In most organizations, board members have minimal levels of computer literacy and risk-related knowledge. Include the following information in your report preparation:
A. Introduction
B. Details of the attack
C. Analysis and action
D. Risk Assessment
1. Risk Identification
2. Risk Analysis
3. Risk Evaluation
E. Conclusion
F. References