Tuesday, October 8, 2019
Risk Assessment Research Paper Example | Topics and Well Written Essays - 2500 words
Risk Assessment - Research Paper Example However, there is no security expert tasked with ensuring secure operational environment. The companyââ¬â¢s network is segregated into segments. The Trusted Computing Base is the internal network within GFI. This segment hosts companyââ¬â¢s mission critical systems that are essential to the companyââ¬â¢s operations that affect the financial situation. The most used systems in the enterprise are Oracle database and email. GFI cannot afford a network outage due to the nature of activities in it undergoes. It financial activities will be adversely affected since they depend on network availability and stability. As it is, GFI has experienced DoS attacks twice this year, and its Oracle database and email servers have been compromised for a total downtime of one week. The recovery process cost the company $25,000 and an estimated loss of $1, 000,000 was recorded in addition to customer confidence. In this study, I am going to undertake risk assessment based on GFI network diagram. Knowledge of the vulnerabilities existing in the network will facilitate the design of a solution to counter the threats. Risk assessment will be conducted ion GFI network to establish the likely areas of failure. Risk assessment will focus on managerial, operational and technical aspects that are prone to vulnerabilities and which can be exploited by attackers. Once vulnerabilities have been established, it is easy to tailor safeguards to counter them. Security safeguards and controls are measures undertaken in the company, or added to the information technology environment to mitigate the risks associated with the operation and management of resources. A risk assessment procedure is conducted to determine the adequacy of security controls employed by Global Finance Incorporation. The risk assessment process adopts a methodology and, in this case, a qualitative methodology is preferred. It focuses on the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.