Project #61591 - Enterprise Security Plan: Ranking the Pairs

Extend the table attached to include Probability of Risk and Impact of Risk on the organization and include mitigation steps of the top 5 pairs rated as HIGH


Part 1

Fill out the final three columns in the table from the previous week.

 

Rate the probability and impact of each vulnerability-threat pair as High, Medium, or Low. Note that these are independent of each other. (5 High. 5 Medium, and 5 Low)

 

Rank the pairs in the order they should be addressed by the organization. Note that High/High rows will be at the top and Low/Low rows at the bottom. The team will have to decide where to rank rows not at these extremes.

 

Suggest specific mitigation steps to take for the top 5 rows. You will go into more detail for the final project due in Week Five. Leave the Suggested Mitigation Steps column empty for rows below the top 5.


Part 2

Prepare a brief explanation on the final rankings.

•Describe how the you ranked the pairs and the reasoning behind the suggested mitigation steps.

•Focus on the top 5 rows, but cover why the others were ranked lower and will not be addressed at this time.

•Keep this explanation brief and clear but informative.

 

 

 

Vulnerability

Threat

Probability

Impact

Suggested Mitigation Steps

Low grade website engineering based on programming language

Private Information loss via hacking

 

 

 

Home office location

Unauthorized access and burglary

 

 

 

Use of personal ow laptop computers

Possible unauthorized access

 

 

 

Email spam encounters

Virus infection

 

 

 

Open office layout

Equipment theft or loss

 

 

 

Wireless computers

Reduced security

 

 

 

Shared central database

Unauthorized access to certain information

 

 

 

Unprecedented computer crash

Loss of data

 

 

 

Data redundancy 

Unrestricted access

 

 

 

Shared email domain

Tapping, hacking and unauthorized access

 

 

 

Employees basic computer skills

Deceitful intelligent encounters

 

 

 

Unchangeable building design

Improper fire outbreak mitigation

 

 

 

Casual office location neighborhoods

Reduced Burglar proofing 

 

 

 

Tenet Improvements (Tis)

Unauthorized access to reserved areas

 

 

 

Central Computer server

Possible interrupts when server fails

 

 

 

Subject Computer
Due By (Pacific Time) 03/11/2015 12:00 pm
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy