What value does the asset have to the organization

Assignment Help Management Information Sys
Reference no: EM132042765

Assignment

We use many different types of risk management methodologies and tools. A part of the process involves identifying the threats to our system, generally by attackers who would harm our systems and data (assets).

I've included a project that walks you through a simple threat modeling exercise, using STRIDE, which you will apply using a scenario, to understand the basic process.

1. Read the threat modeling article [Article: Threat Modeling with STRIDE] and complete a threat model and risk management plan

2. Read the attached Project description. you will create a report for your "boss" identifying the threats to your systems/assets in the scenario, who the attackers are, how they will attack (using STRIDE), and will make recommendations for security controls (use your textbook, too).

Project

For the project, you must create a threat model, using STRIDE (remember to use the information in the article at the Web link, to understand these sections). To do so, you must analyze the data and create a threat model document that contains the following sections:

1. A section titled Attacker Viewpoint discussing framing the threat from the mindset of the perceived attacker. Address the following questions:

a. Who is likely to attack the system?

b. What are they likely to attack to accomplish their goal?

2. A section titled Asset Viewpointdiscussing the organization's assets from the information provided in the scenario, above. Be sure to also address the following questions (I recommend placing this in a table).15 points

a. What is the asset?

b. What value does the asset have to the organization?

c. How might that asset be exploited by an attacker?

3. A section, titled STRIDE, that will identify the following security threats for six different categories, as discussed in the article in the Web reference you were asked to read, as they apply to this scenario. Include the following:

a. Spoofing - address any spoofing threats that might be present in the applications or systems. Include the ramifications (impact) of a spoofing attack.

b. Tampering - address any data or databases that might be subject to data tampering (applications, for instance, that might be vulnerable to cross site scripting attacks or SQL injection in the healthcare organization scenario, above).

c. Repudiation - address where repudiation attacks might be possible in the organization.

d. Information disclosure - address where there may be the likelihood for a data breach in the organization's assets listed in the scenario that would allow the attacker to access private information (or, worse, patient health information). Discuss the laws and regulations that would be impacted and the ramifications (impact and penalities) that would be incurred by this organization in that event.

e. Denial of Service - discuss the potential for service interruptions for those systems or applications connected to the Internet. Which systems are vulnerable? What would be the impact to the organization for each connected system, if it were to be unavailable?

f. Elevation of Privilege - discuss the systems and applications that might be subject to an attacker elevating his privilege levels (think of a patient database - what would happen if the attacker was able to gain Administrator access to the database?).

4. A section, titled Risk Mitigation Plan, that summarizes your findings for the boss and discusses the security controls that you recommend for each of the potential attacks that you have identified.

This can be summarized using the table I've provided for you below for each of your threats. Remember to assign the implementation of the recommended security control to a role within the organization (you can use a generic role, such as System Administrator, Database Admin, Security Officer, etc. - your textbook and other supplemental readings listed different organizational roles responsible for managing risk)

Attachment:- Threat Modeling with STRIDE Project.rar

Reference no: EM132042765

Questions Cloud

Some of the common assumptions about action : How can a character within a film challenge conventional action film as well as some of the common assumptions about action?
How can personal computer users protect their pii : Using the Internet, research methods you think corporations can use to protect themselves and their customers from security breaches involving PII.
National memorial for peace and justice : What does the National Memorial for Peace and Justice stands for?
Calculate the accounting break-even point : Calculate the accounting break-even point. (Do not round intermediate calculations and round your answer to the nearest whole number, e.g., 32.)
What value does the asset have to the organization : Who is likely to attack the system? What are they likely to attack to accomplish their goal?What value does the asset have to the organization?
Explain the federal budget process in federal accounting : Question - Explain the federal budget process in federal accounting and financial reporting. Explain the federal budget process
Great migration of african american from the south : When did the Great Migration of African American from the South take place?
Review problem related to the business : Self-defense is big business, especially in urban areas. Self-defense has become one of the leading service business opportunities for entrepreneurs in the US.
What is conventional action in film : What is conventional action in film? Briefly describe three types of violence used in a film to portray something even greater than the plot itself?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop a schedule of activities to prepare for training

Describe the proposed implementation project approval process, identifying stakeholders who will authorize the project team to go forward with the plan.

  Describe essential characteristics to the cloud

List the Apple Cloud and define its functionality and capabilities.Describe essential characteristics to the cloud.

  Analyse policies for managing the information systems

AM953001: Management Information Systems Assignment - Critically analyse policies and procedures for managing the information systems in a specific organisation

  Report to richard norton ceo of software associates1

report to richard norton ceo of software associates1. prepare a variance analysis report based on the information in

  Supporting information - netflix1 in what ways could

supporting information - netflix1. in what ways could netflix visualize movie ratings preferences or trends to provide

  Evaluate the use and applicability of rfid in industry today

Evaluate the use and applicability of Radio Frequency Identification Devises (RFID) in industry today. Choose a company and provide at least two examples of how these devices can be used to improve productivity in its operations.

  Determine the software defect cost factors

Bugs caught in the requirements writing stage simply cost the time to rewrite the requirement. Time spent in this stage is usually constant.

  What extent are the sourcing and innovation strategies

To what extent are the sourcing and innovation strategies are aligned in SAP and to what extent do SAP's competitors align the two strategies different from SAP?

  How much of a factor is the media in white collar crime

Thoroughly analyze the term "white collar crime." How has the meaning of this phrase developed and changed through the years since it was first introduced by Edwin Sutherland in 1939.What did you think white collar crime was before you started th..

  Write up the implementation plan for your company site

Write up the implementation plan for your company site. You will use the other written assignments to help develop this plan. This plan write up will be a one to two page summary of the implementation plan.

  Describe the added error-handling pathways

Produce a narrative which describes the added error-handling pathways that includes: an overview of the errors being checked.

  Difference between authentication and authorization

Take a tour of your building on campus or at work. What is secured at night when workers are absent? Record the location and type of physical access control.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd