Identifying Risks, Response, and Recovery

Good Essays
Running Head: IDENTIFYING RISKS, RESPONSE, AND RECOVERY 1

Identifying Risks, Response, and Recovery
Amy E. Moody
Strayer University
CIS333
Professor Williams

IDENTIFYING RISKS, RESPONSE AND RECOVERY 2
Identifying Risks, Response and Recovery I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. I have now been charged with the responsibility of developing a strategy to deal with these risks as well as a plan to mitigate each risk to reduce the impact that each will have on your organization. Your firewall, which is your first line of defense, is susceptible to two common types of attacks. First there are attacks against the firewall itself with the purpose of the attacker being to take control of the firewalls functionality and then launching a DoS attack. The second type of attack against firewalls is an attack on the LAN side of the firewall. These attacks circumvent the rules and policies of the firewall to gain access to the devices that are supposed to be protected by the firewall. The largest vulnerability that exists with firewalls is improper configuration settings. This can lead to the development of security holes which allow unauthorized access from both outside and within your network. All of the aforementioned attacks, threat and vulnerabilities can be mitigated and or avoided altogether.
There are several keys to ensuring that your firewall is as secure as possible. Use a VPN for all non-public traffic. Ports on your firewall should only be open for services that are utilized by the public. Because most people have dynamic IP addresses, your firewall has to constantly open ports and modify its rules to allow access, this can lead to ports being left open and vulnerable to attacks. Limit the size of your network. Simply put, if you don’t need it, turn it off. If your servers are not running a service that is used by the public, don’t allow it



References: 2009, September 30). 5 Easy Firewall Steps to Identify and Prevent Attacks. Retrieved August 14, 2012, from http://blog.inetu.net/2009/09/5-easy-firewall-steps-to-identify-and-prevent-attacks Deploying Firewalls Throughout Your Organization [Cisco IOS Firewall] - Cisco Systems. Retrieved July 26, 2012, from Deploying Firewalls Throughout Your Organization [Cisco IOS Firewall] - Cisco Systems. Retrieved July 26, 2012, from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710 Gandhi, M. , & Srivatsa, S. Detecting and preventing attacks using network intrusion. International Journal of Computer Science and Security, 2(1), 49-60. Retrieved , from http://www.cscjournals.org/csc/manuscript/Journals/IJCSS/Volume2/Issue1/IJCSS-28.pdf Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning. Mah, P. (2012, January 31). 5 Steps to Protect Exchange Server from Security Attacks. Retrieved July 25, 2012, from http://www.gfi.com/blog/5-steps-to-protect-exchange-server-from-security-attacks Northrup, T. Firewalls. Retrieved July 25, 2012, from http://technet.microsoft.com/en-us/library/cc700820.aspx

You May Also Find These Documents Helpful

  • Powerful Essays

    Identifying Potential Risk 1 Assignment 1: Identifying Potential Risk, Response, and Recovery CIS333 Identifying Potential Risk 2 In this paper I have just been hired as an Information Security Engineer for a video game development company. I have previously identified all of the potential Threats, Vulnerabilities and Malicious Attacks for the videogame development company. The CIO have reviewed my report and has now requested that I draft a report…

    • 1574 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Identifying Potential Risk, Response, and Recovery Maria A. Tisdale Strayer University CIS 333 Professor Robert Whale December 1, 2014 Identifying Potential Risk, Response, and Recovery The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Risk Responses

    • 951 Words
    • 4 Pages

    Risk responses are the defining actions taken during the course of the project that seek to accept, avoid, mitigate, transfer or defer the identified risk. The implementation of risk response plans should ultimately lead to the optimization of the projects success. Which aspects or areas of a project plan are more likely to be affected by risk responses? How do risk responses affect the different areas of a project plan? The aspects of a project most susceptible to risk responses include:…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    HURRICANE IKE RECOVERY RESPONSE Hurricane Ike was the third most destructive hurricane to make landfall in U.S. history with an estimated $22 billion in damages to Texas. Ike’s damage started September 12, 2008 with a 12 foot storm surge flooding 75% of Galveston Island and made landfall September 13. Hurricane Ike sustained winds (110mph) were considered a Category Two, only being one mile per hour from a Category Three (111mph). Ike’s storm surge was considered that of a Category Five. Texas…

    • 1760 Words
    • 8 Pages
    Good Essays
  • Best Essays

    Harley-Davidson, Inc: Identifying eBusiness Risks and Related Assurance Services for the eBusiness Marketplace. Copyright © 2006 by Pearson Education, Inc., Upper Saddle River, NJ 07458. TABLE OF CONTENTS Risks Involved For Harley Davidson Since Integrating E-Business Into Its Supply Chain Management System 2 Internal Controls Which Harley Davidson Can Implement To Mitigate The Risks Identified And How Best Can These Controls Be Audited 5 Business Risks For The Harley Davidson’s Business Partners…

    • 4640 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    a health care organization influence the development and implementation of risk-management and quality-management policies? Proper risk management requires a strong commitment from senior management A documented process that supports the organization's mission. The leadership of a health care organization must exercise its judgment to prioritize resources for risk management purposes. Leadership should develop risk management plans. Quality management requires managers that understand the…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    audit risk model, which is used to determine the nature, timing, and extent of audit procedures. Describe the components of the model and discuss how changes in each component affect the auditor’s need for evidence. The audit risk model is used to determine the nature, timing, and extent of substantive audit procedures. The components of audit risk model usually stated as follows: DR = AR/(IR x CR) Where: DR = detection risk; AR = audit risk; IR = inherent risk; CR = control risk Detection Risk: auditors’…

    • 2653 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Recovery

    • 1348 Words
    • 6 Pages

    Recovery What is recovery? I think recovery means hope which leads a person to cure. Principles The principles of recovery-oriented mental health practice ensure that mental health services are delivered in a way that supports the recovery of mental health consumers. They are: 1. Uniqueness of the individual recognises that recovery is not necessarily about cure but is about having opportunities for choices and living a meaningful, satisfying and purposeful life, and being a valued member of…

    • 1348 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    there has been substantial progress in modern medicine, mental health services also have been experienced drastic transformations in recovery paradigm (Brown, 2012). But before start, it needs to be pointed out what the recovery is. The Oxford Dictionary (2017) defines recovery as “a return to a normal state of health, mind or strength”. However, the meaning of recovery needs to be viewed differently in mental health because a normal state in mental health seems vague…

    • 234 Words
    • 1 Page
    Good Essays
  • Good Essays

    recovery

    • 2404 Words
    • 10 Pages

    Client is a Caucasian female D.O.B 11/11/1980 age 33 yrs. Name Taylor Jones current address 55566 Rose Lane Bellflower California 90242. Phone number is (562- 862-2696). Taylor lives with Brother Bob wife Sue, and their 5yr old son. Client has one son age 5yrs old who is currently living with Father. Husband is seeking a divorce from Taylor, and sole custody of son David. Taylor is currently unemployed. Taylor recently lost job due to being late, leaving early and missing too many days. Client attends…

    • 2404 Words
    • 10 Pages
    Good Essays