CRITICAL “1” RISKS AND SHORT-TERM REMEDIATION
< For each “1” risk, add the Remediation you would put into place to Mitigate/Control that risk. Then, add a Cost-Benefit Analysis to show the estimated cost of the loss versus the cost to control the loss. You will need to think about how you would mitigate/control the risk and what type of cost would be associated with that mitigation. REMOVE THIS HIGHLIGHTED TEXT BEFORE SUBMITTING THE PAPER FOR GRADING.>
The risk/threats identified are:
I. Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and others
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
II. Loss or destruction of company information due to insider threats
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
Click Here For More Details on How to Work on this Paper......
Need a Professional Writer to Work on this Paper? Click Here and Get this Essay Done ………
MAJOR “2” / MINOR “3” LONG-TERM REMEDIATION
< For each “2” risk and “3” risk, add the Remediation you would put into place to Mitigate/Control that risk. Then, add a Cost-Benefit Analysis to show the estimated cost of the loss versus the cost to control the loss.You will need to think about how you would mitigate/control the risk and what type of cost would be associated with that mitigation. REMOVE THIS HIGHLIGHTED TEXT BEFORE SUBMITTING THE PAPER FOR GRADING.>
I. Loss of company data due to hardware being removed from production systems
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
II. Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
III. Theft of company confidential information due to insider threats.
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
IV. Loss of customers or revenue due to changes in regulatory landscape that may impact operations.
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
IMPLEMENTATION PLAN
<Below are the Threats from the Project Scenario expanded to include some Risks and Weaknesses along with Domains
and Risk Impacts/Factors..>
R-T-W Domain Impacted Risk Impact / Factor
Threat:Hardware being removed from production systems
Risk: Loss of company data.
Weakness:Access Control procedures do not track location of equipment as it is moved. Hardware may not be
protected from hacking if used outside the data center.
System / Application Domain
“2” Major
Threat: Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
Risk: Loss of company information
Weakness: Software not loaded on mobile devices to lock system when notified of loss.
Workstation Domain
“2” Major
Threat:Production outages caused by various events, such as natural disasters, change management, unstable
software, and others.
Risk: Loss of customers.
Weakness: UPS systems not active to protect systems from outages.
System / Application Domain
“1” Critical
Threat: Internet threats due to company products being accessible on the Internet
Risk: Loss or destruction of company information.
Weakness: Firewalls and Intrusion Control systems not active or updated to protect systems from unauthorized
access.
LAN-to-WAN Domain
Remote Access Domain
“1” Critical
Threat: Insider threats.
Risk: Loss of company confidential information.
Weakness: Former employers, contractors or other insiders having access to company information; current employers
are not managed properly and given access to unauthorized information.
User Doman
“3” Minor
Threat: Changes in regulatory landscape that may impact operations
Risk:Loss of customers or revenue.
Weakness: Change control processes inadequate to handle changes in regulations.
System / Application Domain “3” Minor
Table 1 from Risk Assessment Plan
Click Here For More Details on How to Work on this Paper......
Need a Professional Writer to Work on this Paper? Click Here and Get this Essay Done ………
< For each “1” risk, add the Remediation you would put into place to Mitigate/Control that risk. Then, add a Cost-Benefit Analysis to show the estimated cost of the loss versus the cost to control the loss. You will need to think about how you would mitigate/control the risk and what type of cost would be associated with that mitigation. REMOVE THIS HIGHLIGHTED TEXT BEFORE SUBMITTING THE PAPER FOR GRADING.>
The risk/threats identified are:
I. Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and others
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
II. Loss or destruction of company information due to insider threats
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
Click Here For More Details on How to Work on this Paper......
Need a Professional Writer to Work on this Paper? Click Here and Get this Essay Done ………
MAJOR “2” / MINOR “3” LONG-TERM REMEDIATION
< For each “2” risk and “3” risk, add the Remediation you would put into place to Mitigate/Control that risk. Then, add a Cost-Benefit Analysis to show the estimated cost of the loss versus the cost to control the loss.You will need to think about how you would mitigate/control the risk and what type of cost would be associated with that mitigation. REMOVE THIS HIGHLIGHTED TEXT BEFORE SUBMITTING THE PAPER FOR GRADING.>
I. Loss of company data due to hardware being removed from production systems
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
II. Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
III. Theft of company confidential information due to insider threats.
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
IV. Loss of customers or revenue due to changes in regulatory landscape that may impact operations.
a. Remediation: <replace this text with how you would remediate this risk >
b. CBA: <replace this text with the CBA you calculated for this risk>
IMPLEMENTATION PLAN
<Below are the Threats from the Project Scenario expanded to include some Risks and Weaknesses along with Domains
and Risk Impacts/Factors..>
R-T-W Domain Impacted Risk Impact / Factor
Threat:Hardware being removed from production systems
Risk: Loss of company data.
Weakness:Access Control procedures do not track location of equipment as it is moved. Hardware may not be
protected from hacking if used outside the data center.
System / Application Domain
“2” Major
Threat: Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
Risk: Loss of company information
Weakness: Software not loaded on mobile devices to lock system when notified of loss.
Workstation Domain
“2” Major
Threat:Production outages caused by various events, such as natural disasters, change management, unstable
software, and others.
Risk: Loss of customers.
Weakness: UPS systems not active to protect systems from outages.
System / Application Domain
“1” Critical
Threat: Internet threats due to company products being accessible on the Internet
Risk: Loss or destruction of company information.
Weakness: Firewalls and Intrusion Control systems not active or updated to protect systems from unauthorized
access.
LAN-to-WAN Domain
Remote Access Domain
“1” Critical
Threat: Insider threats.
Risk: Loss of company confidential information.
Weakness: Former employers, contractors or other insiders having access to company information; current employers
are not managed properly and given access to unauthorized information.
User Doman
“3” Minor
Threat: Changes in regulatory landscape that may impact operations
Risk:Loss of customers or revenue.
Weakness: Change control processes inadequate to handle changes in regulations.
System / Application Domain “3” Minor
Table 1 from Risk Assessment Plan
Click Here For More Details on How to Work on this Paper......
Need a Professional Writer to Work on this Paper? Click Here and Get this Essay Done ………
Comments
Post a Comment