StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk Assessment and Security Controls - Assignment Example

Cite this document
Summary
This paper "Risk Assessment and Security Controls" focuses on the business with its system located in an unsecured room that has two vulnerabilities. First is the physical vulnerability and it would be safe to assume that the business owner did not take precautionary measure to protect his network. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Risk Assessment and Security Controls
Read Text Preview

Extract of sample "Risk Assessment and Security Controls"

Risk Assessment and Security ControlsThe business with its system located in an unsecured room has two vulnerabilities. First is the physical vulnerability and it would be safe to assume that the business owner did not take precautionary measure to protect his network and system from malicious intrusion. To protect the network and system, the business owner must institute the following security measures1. Physical security – put in physical security such as lock and key security because the system is in unlocked room within the main building of the business.

In addition, level of access must be scrutinized with only authorized personnel having physical access to the server.2. Control the use of administrative privileges – in addition to physical security, assignment, access and use of the system must be controlled, identified and tracked. 3. Inventory of authorized and unauthorized devices – manage devices that would be given access and effectively prevent unmanaged and unauthorized devices from gaining access.4. Incident response management – management oversight, plans, defined roles to quickly discover an attack and effectively containing the damage and remove the attackers presence, and restore the integrity of the network and system (www.sans.org, nd)5.

Boundary defense – detect/rprevent/correct flow of data transfer in the network by establishing different trust levels.6. Application software security – all acquired software must be managed to prevent, detect and correct security weakness (www.sans.org c, nd)7. Malware defense – control the spread of malicious code at multiple points. This would include rapid update of malware defense, data gathering and corrective action (www.sans.org b, nd).8. Data protection – must have tools that will prevent data exfiltration to preserve the integrity of critical data.9. Data recovery capability – system must properly back up critical data and must have capability to recover it in the event of attack and/or loss.10. Continuous vulnerability assessment and remediation - - continuous evaluation of new information to identify vulnerabilities that would minimize if not totally eliminate opportunities for attackers.

References Critical Security Control: 6. (n.d.). SANS Institute -. Retrieved April 6, 2014, from http://www.sans.org/critical-security-controls/control/6Critical Security Control: 13. (n.d.). SANS Institute -. Retrieved April 6, 2014, from http://www.sans.org/critical-security-controls/control/13Critical Security Control: 18. (n.d.). SANS Institute -. Retrieved April 6, 2014, from http://www.sans.org/critical-security-controls/control/18

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk Assessment and Security Controls Assignment”, n.d.)
Risk Assessment and Security Controls Assignment. Retrieved from https://studentshare.org/business/1638180-risk-assessment-and-assignment-of-security-controls
(Risk Assessment and Security Controls Assignment)
Risk Assessment and Security Controls Assignment. https://studentshare.org/business/1638180-risk-assessment-and-assignment-of-security-controls.
“Risk Assessment and Security Controls Assignment”, n.d. https://studentshare.org/business/1638180-risk-assessment-and-assignment-of-security-controls.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk Assessment and Security Controls

Risk Assessment for Effective Physical Security

The paper "risk assessment for Effective Physical Security" justifies the point physical security threats are as detrimental to an organization as non-physical attacks.... It is imperative that risk assessment be conducted on the various security measures that can be undertaken.... This paper will analyze the importance of physical security measures then the critical considerations used for physical security risk assessment in order to institute an effective physical security system....
8 Pages (2000 words) Essay

Security Recommendations After Security Breach

However, the huge costs involved go not mean taking chances with business network security especially given the rapidly expanding networks both commercially and… With these and other factors, security issue gains top priority for all companies where information technology use is inevitable.... As a security administrator of a major organization recently breached by social engineer, below are the Thesis: With network breaches being inevitable, small, medium, and large organizations must have security plans and standard operation procedures in place to prevent, detect, and respond efficiently to intrusions....
4 Pages (1000 words) Assignment

Threat and Risk Management

The Control Crisis group has been tasked with the responsibility of providing strategic guidance on security risks to the Foreign Commonwealth Office in Iraq.... Another reason that has altered the risk landscape involves the drone strikes by the United States against terrorist leaders in Iraq.... In addition, the reversal of a military strategy in the country has changed the risk landscape.... As a result, there is always the need to conduct risk assessments regularly....
12 Pages (3000 words) Essay

Risk Process and Security Policy - Becoming Company

The paper "Risk Process and security Policy - Becoming Company" states that the company has put a number of hardware and software in place.... These systems have different vulnerabilities and security risks particularly with regard to the sensitivity and confidentiality of the information they are used to store.... hellip; Although the company has used a number of access controls and safeguards to help improve the security of the sensitive and confidential information in the company, there are still a number of security vulnerabilities that if exploited may result in a number of tangible and intangible losses to the company....
6 Pages (1500 words) Assignment

Organizational Security Plan

These concepts include physical security controls, perimeter fence protection, external building safety and the use of access control and protective systems.... The physical security is comprised of the use of basic physical security controls to protect.... A security plan is made up of procedures, strategies, policies, controls, and protocols that an organization uses to prevent security risks.... In the paper “Organizational security Plan” the author looks at the proliferation of industrial espionage as well as the growth of terrorist networks across the globe....
6 Pages (1500 words) Assignment

Risk Management of Oxfordshire Fire and Rescue Service

risk assessment A risk assessment is a cautious examination of potential causes of harm, the people they are likely to affect and the possible measures to be taken against these hazards.... Assessment of risks occurring in the student's accommodation center So as to make an effective risk assessment process, the organization had to start by considering the first step of considering the hazards which are the potential causes of the risks.... … The paper "assessment of Risks Occurring in the Student's Accommodation Center" is a wonderful example of a case study on social science....
11 Pages (2750 words) Case Study

The Provision of Fire Safety Systems and Procedures

Fire Safety Policy Statement The University of Central Lancashire is totally dedicated to its legislative and moral responsibility to conform to the requirements of: Regulatory Reform (Fire Safety) Order 2005 The Building Regulations 2000 (as amended) Obligations conferred by various regulations in regard to the protection of life from fire This policy statement applies to JB Firth building and the building will be made the subject of an appropriate assessment to establish, so far as reasonably practicable, the risk which relevant individuals are exposed to from fire....
6 Pages (1500 words) Assignment

Personal Computing Situation Security Assessment

… The paper “Personal Computing Situation security Assessment”  is an exciting example of an essay on information technology.... This is a report on a security assessment conducted on my personal computing situation with regards to the different gadgets, computers, and cloud storage servers.... The security assessment will be done on home computers, personal laptops, smartphones, etc.... The paper “Personal Computing Situation security Assessment”  is an exciting example of an essay on information technology....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us