Network Risk Assessment

In: Computers and Technology

Submitted By caml
Words 700
Pages 3
If I were hired as a consultant to secure all network devices for a large firm, there are a few things that I would have to do to determine the needs of an organization. I would have to examine a few aspects in regards to the employees, software and hardware. Identifying software and hardware assets that need to be safeguarded, as well as what is required to defend personnel is also necessary. Many establishments prefer that most or all procedures could be mechanized, but there are still certain things that must be done manually.
Ensuring network security should not be taking as an expense that will not help an organization to produce more and be more efficient. As an alternative of thinking about network security as a technical concern, companies must consider it a business continuity concern. Networks have developed to be a rudimentary part of undertaking a business in the present day. This makes security planning as serious and as important to a business as sales and marketing.
As a consultant, I will review all of the processes and devices and try my best to make them automated. There will also be steps taking to have backups in the event of automated failures. The review of customer data, business data and property would also be something to do. I would also have to examine were this data and information are stored and how easily it can be accessed. A Disaster Recovery Plan is another thing that I will have to put together.
With this in place it will make sure that servers and other devices are safeguarded and are in a location where it will not be impacted by a disaster. After looking at the potential risks that were discovered in a risk analysis, I would have to take measures in order for mitigation. A very effective way in doing this would be by Pen-Testing.
This is a very good option to discover weak points in the firm. I would of course have to…...

Similar Documents

Risk Assessment

...Practical Risk Assessment The following example is an activity that could be carried out at work – but which most people will do at home – changing a lightbulb. I have chosen this as it is an example of an activity that most people can relate to, wether we live in a house or a bungalow. The fluorescent light is on the ground floor of an office block. It is four o’clock on a December afternoon and must be changed. Assume there are no controls in place other than those listed below. The ladder has to be placed in one of the fire escape routes for the room. Hazards Use this box to list all the hazards identified in the activity. The tick box list includes some of the more common hazards that may be encountered when doing your risk assessment. It also provides space to allow you to add your own. In this example we have identified a number of hazards that could be present in this activity. The main ones are concerned with electricity cuts burns working at height working in the dark. These should be written in the hazards section of the form, you will see that we have identified some of the problems associated with those hazards. Those at risk All those exposed to the risk should be listed here. It is important to list everyone who could be harmed as all may influence how you may intend to control the risks. You may decide that you require different controls for others not carrying out those activities. Current Control Measures Use this box to list the......

Words: 782 - Pages: 4

Risk Assessment

...Risk assessment plays a huge role in the juvenile justice system. Why is it so important, why is it more important than with adults? Risk assessment is important in the juvenile justice system because the assessment allows the courts to determine the likelihood of the juvenile returning to the system. The risk assessments also allow the court to develop programs to prevent the juvenile from returning to the system. The system will consider such factors as the age of the offender, prior offenses, drug or alcohol abuse, parental control of the juvenile, and if there might be school/peer issues that contribute to the offense. This is important because if the system were to punish each and every juvenile for every offense committed then the system would be full of juveniles that are not given the chance to redeem themselves or even give the offender the chance to make things rights. Just because an offender has committed a crime does not mean that the offender will not change, if given the opportunity. Why the risk assessment is more important for juveniles than for adults is because the adult has already proven that he or she has had prior offenses and most likely will return to the system. If the system were to continue the assessments into adulthood then there would not be a "difference" between the adult system and the juvenile system. Champion, D. J. (2010). The Juvenile Justice System: Delinquency, Processing, and the Law (6th ed). Upper Saddle River, NJ: Prentice Hall....

Words: 254 - Pages: 2

Risk Assessment

...Risk Assessment Approaches 1. Estimate the risk of bringing the project to completion: * On time: little to no risk because the project would be developed and fully operational within the time limit of the contract. * One month early: this would give us more time to develop test and bring the network into full production with ample time to fix minor issues if there are any. * Two months late: there is a risk associates with a reduction to the company overall contract by 4% (2% for each month late). If we cannot get the whole project up in production, then the risk would be the contract is being transferred to another bidder. 2. Estimate the risks of bring the project to completion: * On time, but not with the require security: technically the project is done but there is a security risk that may violate the contract because technically the company did not finish the required services stated in the contract. * One month early with the require security requirement: there is no risk. The company completed the project early with the required services indicated within the contract. Therefore, the client can continue with normal operation much sooner than expected. * Two months late, without the required security requirement: depending on when the company can implement the security requirements is directly correlated with the contract and its guidelines; the contract may be ultimately transfer to a different bidder. 3. The company has met most...

Words: 280 - Pages: 2

Risk Assessment

...Risk Assessment Risk Assessment Holly Regan SCI/275 August 3, 2014 Stacy Murphy Risk Assessment The chosen case study from the text is in relation to human exposure to asbestos and the health risks this chemical compound imposes. According to Shultz (2012), low levels of asbestos exposure, even for short periods of time, can cause lung cancer among asbestos insulation workers with a death rate four times the expected rate. Lung cancer in asbestos workers who smoke is ninety-two times greater than in those who don’t, providing a vivid example of synergism. (The ratio of the number of observed to the number of expected deaths times 100) Asbestos is a combination of minerals that are native to the environment comprised of silicate compounds which are resistant to heat, chemicals, fire and conducts no electricity. There are two major groups of asbestos minerals, serpentine and amphibole. The serpentine group contains Chrysotile, which is the most mined and commercially used in North America since the 1800’s. Asbestos is used in the building and construction industry for insulation and roofing, the shipbuilding industry to insulate steam and hot water pipes, and the automotive industry for brake and clutch pads; among many other categorical uses, (The National Cancer Institute at the National Institutes of Health, 2009). The factors of acceptable risk for the chemical asbestos are 1) acceptable if risk is not greater than those created by......

Words: 453 - Pages: 2

Risk Assessment

...Security Management RISK ASSESMENT Information systems have long been at some risk from malicious actions or inadvertent user errors and from natural and man-made disasters. In recent years, systems have become more susceptible to these threats because computers have become more interconnected and, thus, more interdependent and accessible to a larger number of individuals. In addition, the number of individuals with computer skills is increasing, and intrusion, or “hacking,” techniques are becoming more widely known via the Internet and other media. Arisk assessment is not about creating huge amounts of paperwork , but rather about identifying sensible measures to control the risks in your workplace. You are probably already taking steps to protect your employees, but your risk assessment will help you decide whether you  have covered all you need to. Think about how accidents and ill health could happen and concentrate on real risks – those that are most likely and which will cause the most harm. For some risks, other regulations require particular control measures. Your assessment can help you identify where you need to look at certain risks and these particular control measures in more detail. These control measures do not have to be assessed separately but can be considered as part of, or an extension of, your overall risk assessment. Although all elements of the risk management cycle are important, risk assessments provide the foundation for......

Words: 3691 - Pages: 15

Risk Assessment

...Risk Assessment The city council of Genericville faces a challenging decision that could impact the city both economically and environmentally for years to come. Genericville’s main source of income is from tourism, which is being threatened by the increasing mosquito population and the West Nile Virus. The councilors have been asked to vote on a proposed plan to deal with this increasing threat. On one hand, the decision can be made to spray a potentially harmful chemical on the neighboring wetlands to reduce the threat of the spread of the West Nile Virus; on the other hand, a plan can be enacted that calls for a thorough educating of the Genericville population on how to avoid contact with mosquitoes and reducing their breeding grounds. After performing a risk assessment for human exposure to malathion, the proposed chemical, the risk of not taking action against the mosquito population was much higher than the risk associated with spraying malathion. Based on the information presented by the Agency for Toxic Substances and Disease Registry, malathion has no direct links to be a carcinogen. Malathion is not known to cause birth defects in humans under common use (Agency for Toxic Substances & Disease Registry, 2005). In laboratory tests, the chemical has been proven to cause some minor irritations of the eyes and skin as well as complications with respiratory and gastrointestinal systems. These effects are a result of contact with airborne vapors,......

Words: 712 - Pages: 3

Risk Assessment

...------------------------------------------------- Risk Assessment Risk assessment It is the process of analyzing threats to, and vulnerabilities of, an information system, and the potential impact that the loss of information or capabilities of a system would have on national security or your company's bottom line. Identifying threats To identify threats, look at the organization, the guardian organization and the business/nation. At each one level, focus the risk by inquiring as to whether an assailant can represent a danger. Does somebody have the inspiration to endeavor a helplessness? Is there a background marked by effective endeavor? Does somebody have a past filled with focusing on your industry? An alternate approach to distinguish dangers is to consider the properties the association may have: divulgence (trading off radiations, capture, dishonorable support techniques, programmers); interference (tremor, flame, surge, malignant code, power disappointment); adjustment (information passage blunders, programmers, noxious code); decimation (force spikes, fire, characteristic catastrophes); and evacuation (burglary of information or frameworks). To focus vulnerabilities, utilize the grid to meeting staff, audit past security occurrences, and analyze review and framework records and framework documentation. Contact merchants for reports of known framework vulnerabilities, check counseling Web locales and search for security issues by utilizing computerized......

Words: 1345 - Pages: 6

Risk Assessments

...Risk Assessment Tammie Clayton SCI/275 June 17, 2015 Richard Dunsheath Risk Assessment The case study I chose was “Asbestos: How great a Danger”? Asbestos is the generic name for several naturally occurring silicate mineral fibers. These fibers which are used as a heat insulator can easily be dislodged and may be inhaled in the lungs, where they remain for life (Bateman, 2011). They produce three disorders: pulmonary fibrosis, lung cancer and mesothelioma. Asbestos is referred to as a unique fiber. Asbestos is used as a heat insulation on ceiling and pipes in factories, schools and other buildings and sprayed on walls. It has also been used in things such as brake pads, brake linings, hair dryers etc. Everything we do puts humans and the environment at risk. The acceptability of risk is also influenced by perceived benefit. Asbestos underwent a complicated road from being an industrial commodity and must have, to being a huge risk, being one of the most dangerous fibers. There has been a call for a total ban on the use of asbestos due to the current health risk. Asbestos use is seen as not acceptable, controlled use is not possible and safer substitutes are available. In this case study, the benefits do not outweigh the cost. One may save money using asbestos, but the cost to seek healthcare for the individual affected is far more costly. In expressing...

Words: 453 - Pages: 2

Risk Assessment

...security risk lack within its network. GFI relies on its application servers; the Oracle database and the email system that are the backbone of the GFI financial operations. The financial and cash flow system of the company solely depends on the network, any network breakdown, and system failure would be catastrophic for the business and its clients. The recent multiple cyber attacks on the GFIs network and the 2012 Oracle server attack that left the company integrity, confidentiality and availability venerable for several days. Although the servers were restored, the damage was extensive and lead GFI to pay for clients damages in their loss of data confidentiality. Another attack left the entire GIF network down that lead to losses in revenues and intangible customer confidence to the tunes of over a million US dollars. Risk Assessment Purpose The aim of this risk assessment is to evaluate the details of GFI network security. Further, the risk assessment is to come up with a structured qualitative assessment of GFIs network environment and provide possible solutions for mitigating the sensitivity, threats, vulnerabilities, risks and safeguards of the GFIs network. Besides, the assessment will recommend on a potential cost-effective assurance that will combat the threats and associated exploitable vulnerabilities. These safeguards will be security features, controls and tools that when GFI include or add in their information technology environment, they will mitigate the......

Words: 2661 - Pages: 11

Risk Assessment

... Subject: Risk Assessment in Business Plans Report of: City Treasurer Summary The Subgroup requested a review of the risk management components of service business plans. This report provides a review of the current completeness and content of risk assessments, synthesizing emerging themes and providing a comparison with the quality of content in previous years. Recommendations Members are requested to comment on the report. Wards Affected: All Contact Officers: Richard Paver City Treasurer 0161 234 3564 E-mail richard.paver@manchester.gov.uk Tom Powell Head of Audit and Risk Management 0161 234 5273 E-mail t.powell@manchester.gov.uk John Gill Risk Manager (Strategy) 0161 234 5272 E-mail J.Gill1@manchester.gov.uk Background documents (available for public inspection): None 1. Introduction 1.1. Thirty Heads of Service are required to produce and update service business plans on an annual basis. The deadline for the receipt of the latest draft plans was 14 October 2010. In order to provide effective support and challenge to Heads of Service in further developing their plans, a team of specialist officers was established to critique the main sections of the delivery plan which were: • Performance. • Transformation. • Finance. • Workforce. • Equalities. • Risk Management.......

Words: 1977 - Pages: 8

Risk Assessment

...Risk Assessment and Mitigation Techniques Any solution will have inherent risk, the key is to identify and explore the consequences of the risks so mitigation can be incorporated into the implementation plan through contingency plans. Lawrence Sports faces several risks in attempting to implement a working capital policy. The first risk is the extension of credit to customers. If Lawrence Sports is too liberal with extending credit they will be faced with the need to borrow money to meet the target cash balance. On the contrary, if Lawrence Sports has a strict credit policy, sales may suffer as a result. The mitigation of this risk is for Lawrence Sports to have a conservative credit policy and consistent implementation with every customer. The second risk is the implementation of the electronic payments. Lawrence Sports can not coerce Mayo Stores, Gartner Products or Murray Leather Works to convert to a new system which Lawrence Sports may implement. In addition, an aggressive attempt to implement the EFT could cause a sever rift in business relations which could cripple the company. To mitigate this risk, Lawrence Sports could communicate early on with customers and vendors about their intention to convert systems and providing explanation of the numerous benefits of implementing an electronic payment system. Lawrence Sports can also offer a higher discount on transactions for a limited period for using the electronic payment process. Cash budgeting may cause shockwaves......

Words: 681 - Pages: 3

Risk Assessment

...Risk Assessment SCI/275   Malathion is something that is being taken into consideration by the City Council of Genericville it is an insecticide spray that will help to control the West Nile Virus and the further spread of the virus. This is a risk assessment on the use of a spray called Malathion in the city of Genericville. There are several steps that are involved in this first is hazard identification and that is the effects that it will have on the health of the humans who are going to be exposed to the spraying of the Malathion. The second is what is called dose response; this is the amount on spray that would be needed to cause any health effects. The third deals with the exposure to all the humans and also based on the total amount of spray that was used and also how long the exposure to the insecticide will last. The final step is what I would call risk characterization which would be used to help determine that if any or certain humans that live in the city would be prone to any health risks that would associated with the use of Malathion. The result of this assessment is that the city of Genericville should really use the insecticide spray called Malathion to help in reducing the spread of the West Nile Virus. There are many sides to this and they include the social, economic, and the political sides of any arguments that have to be considered with the use of the insecticide spray. The West Nile Virus is a very huge concern in the area and that is......

Words: 1146 - Pages: 5

Risk Assessment

...Risk Assessment A risk assessment is something that is produced to help carry out a risk assessment of what might cause harm to the service users and what needs to be carried out in order to avoid the risks from taking place . It is something by law that is expected for all the workplace to carry out. This links in with the HSAWA as every workplace when opening up a business they need to follow the rules and regulation in order to keep the environment safe as well as the employees. When creating risk assessments it’s about producing a table of which identifies all the possible hazards that could take place in the workplace. Every workplace must produce a risk assessment and by creating this you are pointing out all the risk that could take place but also putting in place steps to prevent it from happening. The process of doing risk assessments is to identify hazards and state what they are but also analysing the hazard as to what risks are involved with that hazard and what harm it could bring. Finally, stating the steps that need to be taken in order to eliminate or to control the hazard from occurring. Doing a risk assessment is really important they form an essential part because doing a risk assessment is the key to a good occupation because they help they help to create awareness of the hazards and risks. The aim of having a risk assessment is the process of trying to remove hazards and remove the risk that it accompanies and adding precaution to stop the risks from......

Words: 2044 - Pages: 9

Risk Assessment

...If I were working for McDonalds I would proceed to do a Country Risk Assessment having in consideration the currency risk, the banking risk also economic structure of the country and finally the political and cultural risk. I case of Iran I would overview their problems such as the terrorism so the attacks could be indiscriminate in this point I should found some back up plans to maintain security on my location I would try to locate the McDonalds in a safe area also increased level of awareness like for example against robbery. Another cultural aspect to be aware is religion, sanitation, clothing & equipment, emergency first aid in case of terrorism. Currency risk According to the Economist Intelligence Unit, the currency is stable and strong foreign-currency earnings from oil sales that will help to support their currency. The negative aspect is the higher inflation and the increasing use of alternative asset classes for government compensation payments following the removal of subsidies. Economic Structure According to the Economist Intelligence Unit, Iran economy is based on and dependent on hydrocarbon revenue, Iran is the second largest gas reserves in the world. Iran has concerns about the level of oil production and insufficient foreign investment in the sector. Political and Cultural Risk Internal and external security situation, policy competency and consistency, and other such factors that determine whether a country fosters an enabling business environment...

Words: 322 - Pages: 2

Risk Assessment

...large emphasis on financial risk assessments. The risk assessment process is needed to identify risks that need to be treated within an organization, as well as to provide strategies and methods that are most appropriate to treat these risks. Because many organizations are poorly aligned between their risk exposure and their risk appetite, it is important to engage in the risk assessment procedures. These procedures can help an organization prevent risk exposure and determine if their current operations will result in an increase or decrease of market value and owners’ wealth. As a result of the economic crisis, and the recent increase in corporate failures, organizations can now learn from the mistakes of others. This paper will discuss the mistakes that lead WorldCom, a telecom company that was once the fourth-ranked in Fortune 500, to bankruptcy in 2002, in an effort to demonstrate the importance of successful risk assessment and alignment implementation. Keywords: corporate failure, risk analysis, risk assessment, risk management, WorldCom Over the past years, and as a result of high profile firm failures, the economic crisis, and increased regulatory pressure, many organizations have placed a large emphasis on financial risk assessments. Risk assessment is the process where risk managers analyze the risks of an organization and identify risks that need to be treated (Tarantino & Cernauskas, 2011, p.47). In addition, a risk assessment provides strategies......

Words: 4331 - Pages: 18