Question

In: Computer Science

As part of a formal risk assessment of the main file server for University

As part of a formal risk assessment of the main file server for University, you have identified the asset “integrity of the student accounting records on the server” and the threat “financial fraud by a student or staff, disguised by altering the accounting records”. Suggest reasonable values for the items in the risk register for this asset and threat and provide justifications for your choice.

Solutions

Expert Solution

  • For every threat, survey the probability that the function will neglect to carry on as required, in view of your assessment of the specialized trouble of actualizing the function.
  • Utilize the subjective scale depicted in the risk analysis methodology. The probability is an assessment of the probability that the item execution will neglect to meet the prerequisite as indicated, not that the client will commit an error. At the end of the day, we are keen on the probability that the item will neglect to distinguish invalid information, or neglect to effectively deal with substantial information, or generally carry on inaccurately.
  • We are not inspired by the probability that a client will utilize a function erroneously, or give invalid information, or generally abuse the item.
  • Survey the effect of a function's disappointment, in view of your comprehension of the item's motivation and your assessment of how a disappointment of that kind may influence the end client or client, as well as the engineer's main concern. You ought to counsel the venture specialist on the off chance that you can't decide the contact with certainty. Once more, utilize the subjective scale portrayed in the risk analysis technique.

Related Solutions

File Sharing Server A company would like to develop a file share server on the corporate...
File Sharing Server A company would like to develop a file share server on the corporate network. The file share would be used by employees and occasionally by customers, so parts of the file share would be accessible from the Internet. Some employees would share files with each other, but most would simply store files which would only be visible and usable by them. Some employees are in groups which would share files with each other, but those files should...
The main purpose of risk assessment procedures is to Obtain an understanding of the entity and...
The main purpose of risk assessment procedures is to Obtain an understanding of the entity and its environment, including its internal control, to assess the risks of material misstatements at the financial statement and assertion levels Test the operating effectiveness of controls in preventing, or detecting and correcting, material misstatements at the assertion level Detect material misstatements at the assertion level. All of the given choices are main purposes of risk assessment procedures Inquiries directed towards those charged with governance...
This problem is based on the JA Tires data.. As part of risk assessment procedures, you...
This problem is based on the JA Tires data.. As part of risk assessment procedures, you have been asked to perform some preliminary data analytics on the sales file to assess whether individual transactions or classes of sales transactions represent increased inherent risk because they are large, unusual, or involve related parties. You can perform this analysis using Excel. Required: a.   Identify the five largest sales transactions. Indicate whether you believe these transactions should require an increase in inherent risk....
Using node.js, create the following tasks. 1. Set up a server and HTML file server as...
Using node.js, create the following tasks. 1. Set up a server and HTML file server as shown in the videos. Once you have it successfully running, make the following adjustments A. When a 404 error (file not found) occurs, display a funny message about the file missing and/or did you forget how to type? B. If the user enters a request for the home page (index.html) then: Display an index.html page you have created which includes your name, course number,...
As part of the risk assessment procedures required by ISA 315, the auditor must carry out...
As part of the risk assessment procedures required by ISA 315, the auditor must carry out certain procedures to obtain information relevant to identifying risks associated with related parties. Describe the audit procedures.
Given a file of size 274 Mbits, a server holding the file with upload capacity 8...
Given a file of size 274 Mbits, a server holding the file with upload capacity 8 Mbps, 3 users wanting the file with upload capacities of 3, 3, and 4, and download capacities of 20, 27, and 17 (all in Mbps). What is the minimum file distribution time (in sec) under peer-to-peer architecture? (answer to the 1st decimal places)
Perform research on Risk Assessment in large corporations (any facet of risk assessment – such as...
Perform research on Risk Assessment in large corporations (any facet of risk assessment – such as email policies, wifi usage, web access, or physical security). Now, imagine you are the security manager for that company. How could you implement a company-wide email policy to minimize risk from intruders or misuse? Write a posting explaining your plan. Post between 100 and 200 words for your initial post.
Discuss the main similarity and difference between a dedicated web server and a co-located web server....
Discuss the main similarity and difference between a dedicated web server and a co-located web server. Group of answer choices Both of them are mainly used for small to medium-size web sites. Both of them are mainly used for large to enterprise-size web sites. Both of them are kept and connected to the Internet at the web host provider's location. One of them is kept and connected to the Internet at the web host provider's location, while the other is...
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions...
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions made by HGA management? Justify their decisions based on cost benefit analysis. PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions...
REGARDING RISK ASSESSMENT What’s the recommendation by the risk assessment team? What are the final decisions made by HGA management? Justify their decisions based on cost benefit analysis. PLEASE MAKE COPY PASTE AVAILABLE MUST BE 250 WORDS
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT