Question

In: Computer Science

REGARDING RISK ASSESSMENT What are the control measures currently in use to protect against disclosure/brokerage of...

REGARDING RISK ASSESSMENT

What are the control measures currently in use to protect against disclosure/brokerage of information?
What are the vulnerabilities related to information disclosure/brokerage found by the risk assessment team?

PLEASE MAKE COPY PASTE AVAILABLE

MUST BE 250 WORDS

Solutions

Expert Solution

Risk Assessment is the method of identifying the threat and various factors of risk which can cause harm to the information. After that the risk associated with these factors and analysed and evaluated. At the last step the various steps are taken to eliminate that risk or for controlling that risk of the risk cannot be completely destroyed. These are various steps which are performed in the risk assessment.

What are the control measures currently in use to protect against disclosure/brokerage of information?

Ans: -

For protecting against the disclosure and brokerage of the information control measures are performed by the risk assessment and management team. System administrator defines the access controls. The members of the team are assigned to the different groups as it is a group-oriented process.

All the members or users of the system are completely trained for security policies and awareness before giving them the access of account credentials of the LAN servers. Training is the most important and essential part of the process because it all users should have proper knowledge regarding the working mechanism.

Only the system administrator who have legitimate access to the database should be allowed to disclose information to any employee or higher authorities with genuine work-related reasons.

All the documents and copies of the security policies and measures should be issued to the new employees and users of the system so that they follow all the relevant guidelines for protecting the disclosure/brokerage of information.

So, the above security measures needed to be followed to protect the disclosure and brokerage of the sensitive information. There can be many threats like interruption of the operations, brokerage of information and network related threats that can lead to the leak of the confidential and sensitive information.


What are the vulnerabilities related to information disclosure/brokerage found by the risk assessment team?

Ans: -

HGA is Hypothetical government agency which defines the rules and protocols to deal with the security threats and issue in any organizational environment. But if the policies procedures and standards defined by the HGA authority are not properly compatible with its own environment than it can be vulnerability found by the risk assessment team.

The documents which are used to store and keep record of the time and attendance of the different users should be saved on the regular basis. But if these documents and copies of these documents are not being saved on the system server regularly than this information can get locked and cannot be accessed. So, this is also a vulnerability and threat to the information.

If the HGA system does have capability to track and trace the attacker’s information then it could lead to the disclosure/brokerage of the information. So, system should audit and create log of the attacker while attacker access the system.

There may other network related vulnerabilities of the system like accidental loss of the sensitive information. Backup and recovery of the information is the essential part to prevent the accidental loss of the confidential information.


Related Solutions

REGARDING RISK ASSESSMENT What are the control measures currently in use to protect against interruption of...
REGARDING RISK ASSESSMENT What are the control measures currently in use to protect against interruption of operations? What are the vulnerabilities related to continuity of operations found by the risk assessment team? PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 W0RDS
REGARDING RISK ASSESSMENT What are the control measures currently in use to protect against network threats?...
REGARDING RISK ASSESSMENT What are the control measures currently in use to protect against network threats? What are the network-related vulnerabilities found by the risk assessment team? PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
Security Controls to Protect Assets What are the control measures currently in use to protect against...
Security Controls to Protect Assets What are the control measures currently in use to protect against payroll fraud? What are the vulnerabilities related to payroll fraud found by the risk assessment team? Please make copy paste available Must be 250 words
REGARDING RISK ASSESSMENT What are the different types of disclosure or brokerage of information? What is...
REGARDING RISK ASSESSMENT What are the different types of disclosure or brokerage of information? What is the probability of disclosure/brokerage of information (in terms of high, medium, low)? What is the potential impact of disclosure/brokerage (in terms of high, medium, low)? Explain. Determine the risk scale of disclosure/brokerage of information. PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
Regarding Risk Assessment: Describe at least three assets that a company will protect. Also, what action...
Regarding Risk Assessment: Describe at least three assets that a company will protect. Also, what action can the IT team to ensure they are protected? Please elaborate. PLEASE MAKE COPY PASTE AVAILABLE
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions...
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions made by HGA management? Justify their decisions based on cost benefit analysis. PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions...
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions made by HGA management? Justify their decisions based on cost benefit analysis. PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team?  What are the final decisions made...
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team?  What are the final decisions made by HGA management? Justify their decisions based on cost benefit analysis. PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
(Regarding Risk management) What is loss control?
(Regarding Risk management) What is loss control?
Regarding Risk Assessment Computer Science Explain how you would purchase an insurance to protect your organization...
Regarding Risk Assessment Computer Science Explain how you would purchase an insurance to protect your organization in case of a security breach. Explain how we would calculate security risks to organizations to prepare for any contingencies. Please make copy paste available 250 Words
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT