Identifying Potential Risk, Response, Recovery

Powerful Essays
Identifying Potential Risk 1
Assignment 1: Identifying Potential Risk, Response, and Recovery
CIS333

Identifying Potential Risk 2

In this paper I have just been hired as an Information Security Engineer for a video game development company. I have previously identified all of the potential Threats, Vulnerabilities and Malicious Attacks for the videogame development company. The CIO have reviewed my report and has now requested that I draft a report analyzing and assessing any potential Malicious Attacks, Vulnerabilities and Threats that may be carried out against the company’s network. I will then choose a strategy for dealing with risk, such as mitigation, assignment, risk and avoidance. Next I will develop controls that will be used to mitigate each risk.

Identifying Potential Risk 3 Now let’s begin by discussing the threat of the Web/FTP server, some servers, or hosts, must be open to the internet. Web servers are examples of such hosts. You want any user to be able to access your web server- but you don’t want everyone to be able to get to your internal network (Fundamentals of Information Systems Security). The simple solution for this is just to isolate the host that is connected to the internet from the internal networks and then create a demilitarized zone. The risk mitigation for the Web/FTP, the FTP is very useful for working with remote systems, or to move files between systems. On the other hand the use of FTP across the internet or other untrusted networks, exposes you to certain security risk. Your object authority scheme might not provide enough protection when you allow the FTP on your system. The next risk for FTP is a hacker can mount a denial of service attack with your FTP server to disable user profile (FTP Security). This is usually done by repeatedly trying to logging on with the incorrect password for a user profile, generally



References: 10 Ways to mitigate Your Security Risk retrieved from, http://www.informationweek.com Kim, David and Solomon, Michael G., 2012, Fundamentals of Information Systems Security, CH 7.p.235 and CH10. P.335. Network Intrusion Detection, retrieved from http://www.itillious.com. Wireless technology Migration: Mitigating risk and increasing supply chain efficiency, retrieved from http://www.ien.com

You May Also Find These Documents Helpful

  • Good Essays

    Running Head: IDENTIFYING RISKS, RESPONSE, AND RECOVERY 1 Identifying Risks, Response, and Recovery Amy E. Moody Strayer University CIS333 Professor Williams IDENTIFYING RISKS, RESPONSE AND RECOVERY 2 Identifying Risks, Response and Recovery I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. I have now been charged with the responsibility of developing a strategy to deal with these risks as well…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Identifying Potential Risk, Response, and Recovery Maria A. Tisdale Strayer University CIS 333 Professor Robert Whale December 1, 2014 Identifying Potential Risk, Response, and Recovery The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Tiffany Kearse Identifying Potential Malicious Attacks, Threats and Vulnerabilities CIS/333 Robert Whale November 2, 2014 With any network organization you want to make sure that you keep on top of vulnerabilities of anything that reaches out to the internet. Computers and servers that touch the internet are ones that must be scanned. As a company you have to make sure that you configure the security settings for the operating system, internet browser and security software…

    • 609 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Identifying Potential Malicious Attacks, Threats and Vulnerabilities CIS 333 Network Security Fundamentals July 23, 2014 We have been tasked by the CIO to draft a report identifying potentially malicious attacks, threats, and vulnerabilities specific to our organization. Further, the CIO would like us to briefly explain each item and potential impact it could have on the organization. Malicious Network Attacks "Network attack is usually defined as an intrusion on your network infrastructure that…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Risk Responses

    • 951 Words
    • 4 Pages

    Risk responses are the defining actions taken during the course of the project that seek to accept, avoid, mitigate, transfer or defer the identified risk. The implementation of risk response plans should ultimately lead to the optimization of the projects success. Which aspects or areas of a project plan are more likely to be affected by risk responses? How do risk responses affect the different areas of a project plan? The aspects of a project most susceptible to risk responses include:…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    HURRICANE IKE RECOVERY RESPONSE Hurricane Ike was the third most destructive hurricane to make landfall in U.S. history with an estimated $22 billion in damages to Texas. Ike’s damage started September 12, 2008 with a 12 foot storm surge flooding 75% of Galveston Island and made landfall September 13. Hurricane Ike sustained winds (110mph) were considered a Category Two, only being one mile per hour from a Category Three (111mph). Ike’s storm surge was considered that of a Category Five. Texas…

    • 1760 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Risk: A potential event that may have a detrimental effect on time, cost, quality and deliverables. Issue: This is an unpredicted event that requires a decision otherwise a negative effect on the project may result. Risk management - general approach Risk management is something that all projects need. The depth of planning may vary. It is not easy. What general approaches can you think about? Typical areas where risk (see also 'The Complete Risk management package') will require assessment…

    • 2930 Words
    • 9 Pages
    Good Essays
  • Best Essays

    What are the potential risks and benefits of migration for European states and societies? Migration has been in existence since humans appeared in the world. However our forbearers had different purposes for moving from one location to another than the contemporary humans. Their reasons for leaving a territory were changing climate or infertile soil1. The motivational factors for modern migration differ from that. They are in tight correspondence with globalization. Through this phenomenon there…

    • 1593 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Week 4 Assignment 1 Click the link above to submit your assignment. Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Due Week 4 and worth 100 points You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls | 5) 2 – Windows 2008 Active Directory Domain Controllers (DC) | 2) 1 – Web / FTP server…

    • 508 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Harley-Davidson, Inc: Identifying eBusiness Risks and Related Assurance Services for the eBusiness Marketplace. Copyright © 2006 by Pearson Education, Inc., Upper Saddle River, NJ 07458. TABLE OF CONTENTS Risks Involved For Harley Davidson Since Integrating E-Business Into Its Supply Chain Management System 2 Internal Controls Which Harley Davidson Can Implement To Mitigate The Risks Identified And How Best Can These Controls Be Audited 5 Business Risks For The Harley Davidson’s Business Partners…

    • 4640 Words
    • 19 Pages
    Best Essays