Preview

Technical Paper

Powerful Essays
Open Document
Open Document
2659 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Technical Paper
center23002311409410012100center818008227695Goodman, Jeremy
Yaw Frimpong, Ph.D.CIS 502 Theories of Security Management
September 1, 2014
941009200Goodman, Jeremy
Yaw Frimpong, Ph.D.CIS 502 Theories of Security Management
September 1, 2014 center700007040880Abstract Risk Assessment for Global Finance, Inc. Network.
9410010000Abstract
Risk Assessment for Global Finance, Inc. Network.

-5715003009900Week 10 Technical PaperRisk Assessment
036300Week 10 Technical PaperRisk Assessment
Introduction
Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.
Risk Assessment Purpose
The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included



References: BIBLIOGRAPHY Gregory, P. (2009). CISSP Guide to Security Essentials. Cengage Learning. Lin, C. (2005, September). PSTN (public switched telephone network). Retrieved from TechTarget: http://searchnetworking.techtarget.com/definition/PSTN Network Computing. (2012, March 22). Flat Network Strength Also A Security Weakness. Retrieved from Information Week Network Computing: http://www.networkcomputing.com/networking/flat-network-strength-also-a-security-weakness/d/d-id/1233495? Olzak, T. (2012, April 18). VLAN Network Segmentation and Security. Retrieved from Infosec: http://resources.infosecinstitute.com/vlan-network-chapter-5/ Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100. Shelly, G., & Rosenblatt, H. J. (2011). Systems Analysis and Design, Ninth Edition. Cengage Learning.

You May Also Find These Documents Helpful

  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.…

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Global Limited has a reputation of being one of the world’s leading providers of infrastructure information systems, software, and services around the world. They are in need of a better business and security practices. They have identified a problem which has been likened to a game of Whack-a-mole. To help with its security problem, Global as called upon the knowledge of CIS-its own Security Division. One of the first steps is to understand what information is critical to the business initiatives. Global Cadence is front-end for over 40 applications and has for 200,000 registered users. Global is working to minimize its impact.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Network Security Policy: Best Practices White Paper - Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Bsa 375 Week 2

    • 1272 Words
    • 6 Pages

    Valacich, J. S., George, J. F., & Hoffer, J. A. (2012). «Essentials of Systems Analysis and Design,» (5th ed.). Upper Middle River, NJ: Pearson.…

    • 1272 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    Dennis, A., Wixom, B. H., & Roth, R. M. (2009). System Analysis and Design (4th ed.). Hoboken, NJ: John Wiley & Sons.…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Dennis, A., Wixom, B. H., & Roth, R. M. (2009). Systems analysis and design (4th ed.). Hoboken, NJ: John Wiley & Sons.…

    • 848 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Joseph S. Valacich, Joey F. George, and Jeffrey A. Hoffer. (2012) Essentials of Systems Analysis and Design, Fifth Edition Published by Pearson.…

    • 1472 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    1. Valacich, Joseph and Jeffrey, Hoffer (2009) Essentials of Systems Analysis and Design, 4nd edition.…

    • 637 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Technical Writing Paper

    • 727 Words
    • 3 Pages

    5. Our engineering center in Milford has the “Sohan House” blueprint, and because of this the manager there has agreed to send one to you from us.…

    • 727 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Riordan Sr-Rm-022

    • 702 Words
    • 3 Pages

    Valacich, J. S., George, J. F., & Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Upper Saddle River, NJ: Pearson Education.…

    • 702 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Valacich, J. S., George, J. F., & Hoffer, J. A. (2012). Essentials of System Analysis and Design (5th ed.).…

    • 1465 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays