Preview

Unit5 Risk Mitigation Control

Satisfactory Essays
Open Document
Open Document
320 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit5 Risk Mitigation Control
Robert Jones
Unit 5 Discussion: Risk Mitigation Control
7/15/2014
IS3110
Mr. Jackson

When it comes to risk management, risk mitigating controls are the key to reducing threats to the network infrastructure. These mitigating controls can be found within standards, such as ISO/IEC 27001, and suggest measures to take in order to reduce risk to an organization’s assets. It is important to understand what each of these controls are in regards to risk management as well as the types of assessments used in determining the proper methods in protecting the infrastructure of any network.

An asset is any tangible or intangible economic resource that can be owned or used to produce value. These range from hardware and software to personnel assets. Threats may be man-made, accidental or an act of nature, which can cause potential harm to the network. Mitigating controls are put in place to significantly reduce either the chance or penalties of a threat.

Types of controls, that an admin can implement, are login identifiers, system and data audits, firewalls, encryption, and session timeouts. All of these controls help to prevent, defect, and correct the network from potential threats. Identifiers are simply authentication methods used to gain access to a network. Audits need to be completed to investigate the activities of personnel as well as identify the status of the overall network. Firewalls must be put in place to protect the network against unwanted users and bugs. Encryption should be used to ensure all data traffic is protected from prying eyes or individuals scanning the network for information they can steal or abuse. Lastly, a policy implementing session timeouts must be enforced to hold all users liable for not properly locking their computers when walking away from it.

All of these controls ensure a greater protection not only for the network, but also for the information or data passing along its highways.

Thank you for coming out,

You May Also Find These Documents Helpful

  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Busy Signals, Unlimited

    • 888 Words
    • 4 Pages

    Assets are things that a company owns that have value. This typically means they can either be sold or used by the company to make products or provide services that can be sold. Assets include physical property, such as plants, trucks, equipment and inventory. It also includes things that can’t be touched but nevertheless exist and have value, such as trademarks and patents. And cash itself is an asset. So are investments a company makes.…

    • 888 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Mis 589 11 & 12 Mini Cases

    • 1102 Words
    • 5 Pages

    Then I would identify the assets. In this case, the assets I worry about most are hardware, network software, client software, data and mission critical applications. The hardware that I am concentrated on is the mail servers, web servers, and client computers and ATMs connected to them. As far as network software, I look at the application software (mail server and web server) along with server operating systems and system settings. With client software, it’s the overall operating systems and system settings. Organizational data and storage is the focus; the databases with records. The mission critical applications are the company website and financial database with spreadsheets/personal history/ applications and appraisals; along with transaction history. At the top of the list; is the mission critical applications necessary to conduct business/ for business survival. Next, is the organizational data, client software, hardware, and network software. As far as threats, the biggest threats in order of dollar loss and likelihood of occurrence are intrusion (internal, external and eavesdropping/hacking), sabotage, fraud, theft of information, denial of service, virus, theft of equipment and finally…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Better Essays

    ACCT444 WK4 HW4 Mk

    • 740 Words
    • 4 Pages

    PCAOB Standard 2 notes that the presence of a material misstatement not detected by the company’s internal controls is to be considered at least a significant deficiency, if not a material weakness for purposes of reporting on internal controls.…

    • 740 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Basics of Accounting

    • 655 Words
    • 2 Pages

    Assets: often defined as an economic resource which is owned by the corporation and is expected to provide future benefits to its operation. Accounting rules allow assets to take two forms: Tangible Assets, which have a physical form such as a building or a piece of machinery. Intangible Assets, which usually involve a legal right or claim such as a patent.…

    • 655 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC571 tips

    • 460 Words
    • 2 Pages

    Phase I – Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Shameka Johnson SE5780 Practices for Administration of Physical & Operations Security Technical Controls Paper Administrative, Technical and Physical Controls (false sense of security) Administrative controls influence the choice of technical controls by giving guidelines and policies on hardware and software installation; such as, having a policy that states that all laptops must have a company standard encryption that the technical support staff supports. Another example, all employees must have the company standard antivirus software on their computers. Administrative controls are concerned largely with the security policies and standards that need to be adhered to throughout the organization.…

    • 871 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    CSEC 630 Final Exam

    • 1055 Words
    • 4 Pages

    Includes policies for delegation of administrative tasks and monitoring of audit logs to detect suspicious activity.…

    • 1055 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Companies can elect to use physical security as part of their contingency planning measures. Physical security measures will include perimeter boundaries, surveillance devices, secure entry points and identifications checks, and secure access for internal sensitive areas. The organization might decide to bring in a specialist response team to help with a variety of threats, whether industrial, medical or any security related incident. Regular security checks on locations and materials should be conducted to deter or identify breaches of security, and strong links with external agencies are useful to augment a company’s resources, as well as share risk. Some considerations related to physical security risk management measures follow (Deutsch).…

    • 1927 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This course provides an overview of controls relating to IT governance, databases and their structures, networks, client servers systems, IT service delivery, business continuity, disaster recovery, IS security, cryptography, firewalls, IDS, IPS, backups, recovery, and distributed systems.…

    • 746 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    1. Implementing authentication and authorization, allowing only authorized users to connect to and manage firewalls.…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Security Controls

    • 467 Words
    • 2 Pages

    There are a number of Information Technology security controls. The three most common are: physical, technical, and administrative controls; however, many organizations break down administrative controls into two separate categories: procedural and legal controls. "Security controls are the means of enforcing security policies that reflect the organization's business requirements, " (Johnson). Security controls are implemented to guarantee the information security C-I-A triad. Furthermore, security controls fall into three types of control classifications, they are: preventive, detective and corrective. These classifications are used to specify when a security control applies.…

    • 467 Words
    • 2 Pages
    Satisfactory Essays