Question

In: Computer Science

Conducting a Risk Assessment (10 marks) You will be given a list of organisation in week...

Conducting a Risk Assessment You will be given a list of organisation in week 3 by your lecturer and you can select any one organisation from them. The organisation uses various IT systems for its daily operations. Assume that you are appointed as an IT Systems Auditor for the chosen organisation and you are asked to provide a risk register must come up for the IT systems in the organisation. A brief introduction of the organisation and the IT systems Identify and explain any major risk in the IT systems components Discuss the consequences of the risk Inherent risk assessment, that is the assessed, raw/ untreated risk inherent in a process or activity without doing anything to reduce the likelihood or consequence Mitigate the risk Residual risk assessment, that is the assessed, risk in a process or activity in terms of likelihood and consequence after controls are applied to mitigate the risk. Create a Risk Register based on the risks identified in the IT systems and prioritise of the risk using a standardised framework such as the ANSI B11.0.TR3 Risk Assessment Matrix Given the fact there is no clear prioritisation framework NOR risk appetite framework, the risk register is your professional assessment of the likelihood and consequence of the risks you identify. When preparing your risk register you should think carefully about the assets the chosen organisation may have and how these may be compromised from the perspective of Information Security. The given organisation is Alliance Insurance.

Solutions

Expert Solution

Risk assessments are used to identify, estimate and prioritize risks to organizational operations and assets resulting from the operation and use of information systems.

Risk assessment is primarily a business concept and it is all about money. You have to first think about how your organization makes money, how employees and assets affect the profitability of the business, and what risks could result in large monetary losses for the company. After that, you should think about how you could enhance your IT infrastructure to reduce the risks that could lead to the largest financial losses to organization.

Basic risk assessment involves only three factors: the importance of the assets at risk, how critical the threat is, and how vulnerable the system is to that threat. Using those factors, you can assess the risk—the likelihood of money loss by your organization. Although risk assessment is about logical constructs, not numbers, it is useful to represent it as a formula:

Risk = Asset X Threat X Vulnerability

Nevertheless, remember that anything times zero is zero — if, for example, if the threat factor is high and the vulnerability level is high but the asset importance is zero (in other words, it is worth no money to you), your risk of losing money will be zero.

There are multiple ways to collect the information you need to assess risk. For instance, you can:

  • Interview management, data owners and other employees
  • Analyze your systems and infrastructure
  • Review documentation

To begin risk assessment, take the following steps:

Find all valuable assets across the organization that could be harmed by threats in a way that results in a monetary loss. Here are just a few examples:
• Servers
• Website
• Client contact information
• Partner documents
• Trade secrets
• Customer credit card data

  1. Identify potential consequences. Determine what financial losses the organization would suffer if a given asset were damaged. Here are some of the consequences you should care about:
    • Data loss
    • System or application downtime
    • Legal consequences
  2. Identify threats and their level. A threat is anything that might exploit a vulnerability to breach your security and cause harm to your assets. Here are some common threats:
    • Natural disasters
    • System failure
    • Accidental human interference
    • Malicious human actions (interference, interception or impersonation)
  3. Identify vulnerabilities and assess the likelihood of their exploitation. A vulnerability is a weakness that allows some threat to breach your security and cause harm to an asset. Think about what protects your systems from a given threat — if the threat actually occurs, what are the chances that it will actually damage your assets? Vulnerabilities can be physical (such as old equipment), problems with software design or configuration (such as excessive access permissions or unpatched workstations), or human factors (such as untrained or careless staff members).
  4. Assess risk. Risk is the potential that a given threat will exploit the vulnerabilities of the environment and cause harm to one or more assets, leading to monetary loss. Assess the risk according to the logical formula stated above and assign it a value of high, moderate or low. Then develop a solution for every high and moderate risk, along with an estimate of its cost.
  5. Create a risk management plan using the data collected.

  1. Create a strategy for IT infrastructure enhancements to mitigate the most important vulnerabilities and get management sign-off.
  2. Define mitigation processes. You can improve your IT security infrastructure but you cannot eliminate all risks. When a disaster happens, you fix what happened, investigate why it happened, and try to prevent it from happening again, or at least make the consequences less harmful. For example, here is a sample mitigation process for a server failure:

    Event (server failure) → Response (use your disaster recovery plan or the vendor’s documentation to get the server up and running) → Analysis (determine why this server failed) → Mitigation (if the server failed due to overheating because of low-quality equipment, ask your management to buy better equipment; if they refuse, put additional monitoring in place so you can shut down the server in a controlled way)

Related Solutions

Describe steps for conducting the assessment of the following natural hazard (25) Risk Assessment of Flood...
Describe steps for conducting the assessment of the following natural hazard (25) Risk Assessment of Flood hazard (e.g., FEMA, USACE) Risk assessment from Climate change hazard Risk assessment from drought hazard
How does inherent risk interact with residual risk when conducting a risk assessment in internal audit?
How does inherent risk interact with residual risk when conducting a risk assessment in internal audit?
Discuss the following related to property management process: (3 Marks) Inherent risk assessment Control risk assessment...
Discuss the following related to property management process: Inherent risk assessment Control risk assessment Analytical procedures Answer: Explain disclosure assertions issues related to investments Audit? (2.5 Marks) Answer: For each of the following substantive procedures, first note whether it is a test of details of transactions or a test of details of account balances. Then decide for which assertion the test provides the best evidence. (2.5 Marks) Trace large cash receipts and payments to the source documents and the general...
what is fraud risk assessment in terms of municipal organisation or entity? What kinds of fraud...
what is fraud risk assessment in terms of municipal organisation or entity? What kinds of fraud risks that are faced by municipal organisations?
Risk Assessment Homework In this assignment, you will perform a qualitative risk assessment, using a template...
Risk Assessment Homework In this assignment, you will perform a qualitative risk assessment, using a template that has been provided below.    A listing of threats has been prepopulated for you. These threats have been categorized by type as shown below:                                                    Threat Origination Category Type Identifier Threats launched purposefully P Threats created by unintentional human or machine errors U Threats caused by environmental agents or disruptions E Purposeful threats are launched by threat actors for a variety of reasons...
Week 1 – Question 1 (10 marks) “The study of international business is fine if you...
Week 1 – Question 1 “The study of international business is fine if you are going to work in a large multinational enterprise, but it has no relevance for individuals who are going to work in small firms.” Please answer this with Harvard Referencing without plagiarism. thank you very much
Part 2: Software security: (7 marks) Assume you are performing preliminary security risk assessment. 1. The...
Part 2: Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
List 6 areas the student nurse should consider when conducting a cultural assessment information on a...
List 6 areas the student nurse should consider when conducting a cultural assessment information on a patient?
In terms of the requirement of conducting a community health needs assessment, do you feel this...
In terms of the requirement of conducting a community health needs assessment, do you feel this is something that for-profits perform as well both initially and periodically to ensure that it stays in tune with meeting the needs of the community in which it serves?
Just anwser the question for me to finish the essays. Thank you! [10 marks] Given the...
Just anwser the question for me to finish the essays. Thank you! [10 marks] Given the following two articles: Google Says a Change in Its Algorithm Will Highlight 'Original Reporting’ THE NEWYORK TIMES By Marc Tracy Sept. 12, 2019 https://www.nytimes.com/2019/09/12/business/media/google-algorithm-original-reporting.html THE STATE OF AI IN 2019 By James Vincent Jan 28, 2019, 8:00am EST This is what's happening in artificial intelligence right now https://www.theverge.com/2019/1/28/18197520/ai-artificial-intelligence-machine-learning-computational-science INSTRUCTIONS: • Write an essay for each article; total two (2) essays. In each essay, answer...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT