Preview

Cmmt 431 Week 3 Software Threat Analysis

Satisfactory Essays
Open Document
Open Document
603 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmmt 431 Week 3 Software Threat Analysis
Applying Software Threat Analysis and Mitigation
April Assmann
CMGT/431
07/27/2015
Mark Stewart

Everyone is familiar with the organization the Red cross, and how many different families and lives they truly have impacted. Many people donate their time and money to help people in need. It is a wonderful organization, but if the team members aren’t fully aware of potential threats that could occur it could be very costly for all of those involved. People depend on the Red Cross when they are in the time of need, such as a Natural disaster. The first threat that I would like to discuss with everyone is in the event of human error thus is events that are either enabled by or caused by human beings, such as unintentional acts (inadvertent data entry) or deliberate actions (network based attacks, malicious software upload, unauthorized access to confidential information). You have to be cautious of everything you’re doing especially when it involves personal information.
…show more content…
Facility owners, particularly owners of public facilities, should develop and implement a security risk management methodology which adheres to the Interagency Security Committee (ISC) standard while also supporting the security needs of the organization as a whole. The first action you need to take is a threat assessment before anything. The first step in a risk management program is a threat assessment. A threat assessment considers the full spectrum of threats (i.e., natural, criminal, terrorist, accidental, etc.) for a given facility/location. The ISC standard only addresses man-made threats, but individual agencies are free to expand upon the threats they consider. The assessment should examine supporting information to evaluate the relative likelihood of occurrence for each threat ("Threat/vulnerability Assessments And Risk Analysis",

You May Also Find These Documents Helpful

  • Better Essays

    It244 Appendix.D

    • 929 Words
    • 4 Pages

    Briefly discuss the internal, external, and environmental risks, which might be likely to affect the business and result in loss of the facility, loss of life, or loss of assets. Threats could include weather, fire or chemical, earth movement, structural failure, energy, biological, or human.…

    • 929 Words
    • 4 Pages
    Better Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    With a good plan in place, we would also conduct the cost of each occurrence and the affect it would have financially. Mitigation plans are as good as we make them. With this mitigation plan the company may address the problems at hand. With all risks we have to take in consideration the impact it would have on our integrity, and confidentiality. The main risk would be an internal risk. Our staff may intentionally or unintentionally want to disrupt the organization. Certain controls have to be placed in order to mitigate the risks, such as access controls, being physical or non-physical. These would help us in the event of an occurrence of a risk. We can pre form a cost analysis of our plan to see what value to the company each risk has. To do that we would use a threat impact matrix, that would let us decipher our cost versus the likelihood of a risk to happen.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    The organisation assess all risks and manages them risk assessments are completed for all things that have the potential to be a risk, these are cared out in the individual establishments.…

    • 1379 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HSM 542 Week 6 You Decide

    • 574 Words
    • 3 Pages

    As the new risk manager, I have been asked to prepare a Risk Management Plan that will help to develop a culture of safety throughout Little Falls Hospital. The purpose of the Risk Management Plan is to provide guidelines and methods to assure that the broad range of both administrative and clinical activities at the facility are monitored and coordinated in order to reduce losses associated with consumer, employee, or visitor injuries, property loss or damage and other sources of potential facility liability. At this facility, Risk Management is the responsibility of every employee. Due to the size and complexity of this facility and its programs, it is necessary for all employees to participate for effective management of risk.…

    • 574 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Safe Guarding 333

    • 2213 Words
    • 8 Pages

    To plan all routines with safety in mind. To report any suspected poor practice, concerns about safe guarding to the appropriate agencies.…

    • 2213 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Essay On Clara Barton

    • 689 Words
    • 3 Pages

    The American Red Cross falls into three categories when dealing with the different kinds of service: nation’s response to war, responding to natural disasters, and other human suffering. Whenever any of these occur, the American Red Cross is always there to lend a hand and do whatever is needed to improve the situation. The people that work with this organization want to help those who are suffering, and their help is…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Red Cross Turnover

    • 301 Words
    • 2 Pages

    Some of the reasons for the Red Cross ethical dilemmas come from their executive turnover rate. The frequent turnover rate of CEOs has greatly weakened the organization's ability to put controls into place. The President and CEO during the 9/11 attack, Bernadine Hartley was forced to resign due to mismanagement of response time. President and CEO Mark Evans was fired after the handling of Hurricane Katrina. During a brief time in 2007 when Mark Everson was President and CEO, he resigned due to an inappropriate sexual relationship. The change in leadership left the organization vulnerable. During times of disaster, the organization did not have the proper procedures in place to screen potential volunteers. Allowing volunteers with…

    • 301 Words
    • 2 Pages
    Good Essays
  • Better Essays

    To set a facility safety plan in which to help to reduce liabilities to health care facilities, these plans are put together by the facility safety committee and the various institutional departments. These plans have to also conform to mandatory government regulations and several other agencies.…

    • 1378 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Health Care

    • 672 Words
    • 3 Pages

    Some potential advantages and challenges associated with communicating within the organization and with the public and private sectors are principles of collaboration. No single sector is prepared with all the resources, knowledge and capability necessary to respond to large scale disasters. Public, private and nonprofit entities must work together to ensure safe communities when preparing for and responding to emergencies. Other challenges that may arise are increased population density, increased population settlement, increased technology hazards or dependency, increased risk of terrorism, emerging infectious disease and increased global and international travel ("Effective Risk and Crisis Information", 2012).…

    • 672 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    While both of the above elements of the question complement each other, without understanding the main purpose of security management, which is in itself is multifaceted in nature, and ideally to be successful should be employed throughout all aspects of a business, as can be seen…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    - Growth market thanks to the development of cybercrime industry and the fact that more and more people use the Internet…

    • 872 Words
    • 3 Pages
    Good Essays
  • Better Essays

    I have chosen scenario 2 for the natural disaster on the Gulf Coast. Though my patient files were destroyed from the hurricane, I am still responsible for having a system in place to secure patient information. Upon completion of reading this essay, one will discover that disaster recovery plan will state how operations will be conducted in an emergency, which workforce members are responsible for carrying out said operations, how data will be moved and retrieved without violating HIPAA standards for security and privacy, and how data will be safeguarded and restored (Rouse, 2010). In addition, my disaster recovery plan will include provision for staff training, a code of conduct, and implementation of my plan.…

    • 1269 Words
    • 6 Pages
    Better Essays

Related Topics