Please boost your Plan to download papers
Design & Technology
Pages 5 (1255 words)
Asset Inventory Name Institution Date Asset ID Asset Name Description Asset Value Priority Threat Description Controls in Place ARO Uncertainty Risk Value Controls Needed Action Plan ID 1.People System administrators(trusted employees) Key Persons Dependency(Poor Systems Administration Patterns) $1,000,000 critical Unavailability of the system IT Security Roles and Responsibilities Medium 0 .7 Low 0.05 0.3 Low $19500 Project Management Standard Access Control Standard Availability of Role specific assistance when need arises…
Account Management Procedure Avoid transmission of un encrypted sensitive data Software Application and Operating system software Exploitation of faults in application and operating system software $2,000,000 High Malicious use, Unauthorized use and System compromise Change Management Standard High 0.8 Low 0.05 0.2 LOW $24,000 IT System Interoperability Security Standard Patches and updates from a reliable sources Hardware Internal server Hardware Issues/Equipment Failure or loss Loss or theft of data from server $8,000, 000 Vital System Unavailable Data Backup and System Restore Standard High 0.8 Low 0.05 0.2 LOW $96, 000 Continuity of Operations Planning Standard Equipment failure is addressed by design, policy or the stated practice. Databases Inadequate Database Support Data corruption or loss $500,000 critical Computer crime, system compromise, unauthorized access Data Storage Media Protection Standard Medium 0.7 Low 0.05 0.3 Low $9750 Remote Access Standard Project Management Standard Maintenance of databases is sustained and supported at appropriate security levels Data Disclosure Disclosure of sensitive personal information issues. ...
Not exactly what you need?