Preview

Mis 589 11 & 12 Mini Cases

Better Essays
Open Document
Open Document
1102 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mis 589 11 & 12 Mini Cases
CHAPTER 11 & 12 MINI-CASES
I. Belmont State Bank
Belmont State Bank is a large bank with hundreds of branches that are connected to a central computer system. Some branches are connected over dedicated circuits and others use the dial-up telephone network. Each branch has a variety of client computers and ATMs connected to a server. The server stores the branch’s daily transaction data and transmits it several times during the day to the central computer system. Tellers at each branch use a four-digit numeric password, and each teller’s computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment.

First, I will begin with building a control spreadsheet for the bank; which looks much like Figure 11.2: (Fitzgerald, 374).
Then I would identify the assets. In this case, the assets I worry about most are hardware, network software, client software, data and mission critical applications. The hardware that I am concentrated on is the mail servers, web servers, and client computers and ATMs connected to them. As far as network software, I look at the application software (mail server and web server) along with server operating systems and system settings. With client software, it’s the overall operating systems and system settings. Organizational data and storage is the focus; the databases with records. The mission critical applications are the company website and financial database with spreadsheets/personal history/ applications and appraisals; along with transaction history. At the top of the list; is the mission critical applications necessary to conduct business/ for business survival. Next, is the organizational data, client software, hardware, and network software. As far as threats, the biggest threats in order of dollar loss and likelihood of occurrence are intrusion (internal, external and eavesdropping/hacking), sabotage, fraud, theft of information, denial of service, virus, theft of equipment and finally

You May Also Find These Documents Helpful

  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    that is used to connect computers and the users. Infrastructure also includes the transmission media such as the lines through telephones television satellites as well as any sort of routers antennas and any other devices that would control the transmission paths. When it comes to managing infrastructures this refers to managing the computing facilities as well as the key elements such as the computer databases the information management systems and the application software. One of the risks in managing the IS would be the globalization issues. Globalization does have its positive side such as opportunities for companies to grow however with that there is also the chance of complex array of operating risks. Without the right infrastructure to conquer these sorts of risks it can lead to company shutdown and no company wants that to happen. Here are a few ways to prevent that from happening.…

    • 774 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Document procedures. Every thing has to be documented. Checks has to be written by ink able printer that issues serialized checks from the company. These checks can be traced and cash and expenses can be tracked. Some one has to be responsible for the petty cash, it can be easy to steal from the company.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Lab

    • 727 Words
    • 2 Pages

    The first step for risk management would be identifying all of your assets. These assets can include the servers you use to sell your electronic parts, as well as all of your data, from customer information to the data to build the parts you sell. It also includes any networking devices and end user workstations. Evaluate what the cost to your company would be if these assets went down. How would the current confidentiality, integrity, or availability be affected if these assets were to be compromised?…

    • 727 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 1 Assignment 1

    • 473 Words
    • 2 Pages

    I would have to say the most likely pairs of threat/vulnerability are location, equipment failure, social engineering, Denial of Service (DOS), and Mal ware. These threats seem to be the most problematic for this company. The first one is location; the servers are all housed in the company headquarters where if a natural or manmade disaster would cripple the company’s infrastructure. They need to distribute their servers to different locations. Another pair is equipment failure; each server has its own specific function that it handles and nothing else. It would…

    • 473 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    First World Bank Savings and Loan (FWBSL) needs to consider the increased revenue and cost that will be present if they decide to offer secure services to their clients. With them expecting to have over $100,000,000 a year for online credit cards and loan applications together with other banking services, they are also expected to provide this service while paying close attention to the three security priorities which are: confidentiality, integrity, and availability. Customers expect FWBSL to be diligent when it comes to protecting their accounts and Nonpublic Personal Information. If something were to go wrong they could lose credibility with their current and potential…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have.…

    • 312 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    * Align identified risks, threats, and vulnerabilities to an IT risk assessment that encompasses the seven domains of a typical IT infrastructure…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The company should back-up its data, enhance its system to be strong & secure, and make regular…

    • 1044 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Mini Case R.K Maroon

    • 553 Words
    • 3 Pages

    price the deal assuming a second round in year 2 of $8,000,000 with a 40% return.…

    • 553 Words
    • 3 Pages
    Good Essays