Premium Essay

Security Assignment Mitigation

In: Computers and Technology

Submitted By security1551
Words 609
Pages 3
In order to mitigate risk security vulnerabilities, I make the next recommendations:
System security plans should be formalized at the system and application levels for networks, facilities, and systems or groups of systems, as appropriate.

Encryption is used to protect the confidentiality of stored data and data that are being transmitted to and from the secured network via the Internet. Additionally, encryption is extremely important in protecting wireless access to the secured network and on portable storage devices. Establishing encryption where necessary is a basic step for protecting sensitive data.

Contingency plans should be formalized to ensure the availability of critical information systems and the continuity of operations in emergencies. These plans should contain detailed roles, responsibilities, recovery team designations, and procedures associated with the restoration of an information system following a disruption.

Configuration management policies, plans, and procedures should be developed, documented, and implemented at the entity wide, system, and application levels to ensure an effective configuration management process. The procedures should cover employee roles and responsibilities, change control and system documentation requirements, establishment of a decision making structure, and configuration management training. Configuration management should be a key part of an entity’s Systems Development Life Cycle methodology

Risk assessments should consider threats and vulnerabilities at the entity wide level, system level, and application levels. When State agencies perform risk assessments, they should consider (1) risks to data confidentiality, integrity, and availability and
(2) the range of risks to their systems and data, including those posed by authorized users
And unauthorized outsiders who may try to break into the...

Similar Documents

Free Essay

Create an Incident Response Policy

...is 4550 security policies and implementation | Unit 8 Assignment 1 | Create an Incident Response Policy | | John C Diggs (14473273) | 8/20/2014 | | Unit 8 Assignment 1- Incident Response Policy An Incident Response Policy (IRP) for privately operated mid-level clinics as well as for major hospitals are created to protect the confidentiality, integrity, and availability of sensitive information stored on facility workstations and servers. The IRP will keep these medical establishments within the legal requirements set forth by federal entities such as HIPPA. The overall IRP shall be a guidance point on how staff shall react in the event of a telecommunication incident. This will insure that faster mitigation, more efficient information gathering, and fewer mistakes may occur during the mitigation of an incident. The Information Security Officer (ISO) is solely responsible for incident mitigation of affected network based assets. During the creation of incident response policies the ISO may consult with IT administrators, the Disaster Recovery Team (DRT), members of the legal department, upper-management, and even vendors. This will allow the ISO to establish an appropriate course of action for any specific incident that just might happen to occur. If an incident should happen to take place, the ISO themself (through proactively monitoring the system’s baseline) can quickly identify an inappropriate system activity that may be what is causing the......

Words: 336 - Pages: 2

Premium Essay

Cmgt 442 Entire Course

...Risk Management Week 2 Individual Assignment Service Request SR-HT-001 (Huffman Trucking Benefits Election System) Prepare a 3- to 5-page paper describing the considerations necessary to address the possible security requirements and the possible risks associated with the Benefits Elections Systems being requested by the Service Request, SR-HT-001 for Huffman Trucking Company. Week 3 Individual Assignment Security Monitoring Prepare a 3- to 5-page paper describing the security monitoring activities that should be conducted in an organization with both internal IT (payroll, human resources, inventory, general ledger, and so on) and e-commerce (Internet sales and marketing) applications. The paper will include the rationale supporting each monitoring activity you propose and any recommended course of action to be taken when a significant risk is identified. Week 4 Individual Assignment Outsourcing Risks Prepare a 3- to 5-page paper that identifies the possible risks to an organization in each of the following outsourcing situations: a) the use of an external service provider for your data storage; b) the use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking; c) the use of a vendor to support your desktop computers; and d) the use of a vendor to provide network support. The paper will include a risk mitigation strategy for each situation. One mitigation strategy, because of......

Words: 2578 - Pages: 11

Premium Essay

Cis 341 Technical Paper

...* Technical Project Paper: Information Systems Security Due Week 10 and worth 110 points You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls to protect medication and funds maintained located on the premises and personally identifiable information and protected health information of your customers. Your supervisor has tasked you with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate the risks identified. 1. Firewall (1)   2. Windows 2008 Active Directory Domain  Controllers (DC) (1)  3. File Server (1)  4. Desktop computers (4) 5. Dedicated T1 Connection (1)     Write a ten to fifteen (10-15) page paper in which you: 6. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 7. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 8. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 9. Identify all potential vulnerabilities that may exist in the documented network. 10. Illustrate in writing the potential impact of all identified logical vulnerabilities to...

Words: 520 - Pages: 3

Premium Essay

Controls

... - Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure; - Addresses eventual, full information system restoration without deterioration of the security measures originally planned and implemented; and - Is reviewed and approved by designated officials within the organization; b. Distributes copies of the contingency plan to [Assignment: organization-defined list of key contingency personnel (identified by name and/or by role) and organizational elements]; c. Coordinates contingency planning activities with incident handling activities; d. Reviews the contingency plan for the information system [Assignment: organization-defined frequency]; APPENDIX F-CP PAGE F-47 ________________________________________________________________________________________________ cial Publication 800-53 Recommended Security Controls for Federal Information Systems and Organizations e. Revises the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing; and f. Communicates contingency plan changes to [Assignment: organization-defined list of key contingency personnel (identified by name and/or by role) and organizational elements]. Supplemental Guidance: Contingency planning for information systems is part of an overall......

Words: 914 - Pages: 4

Premium Essay

Information Systems Security

...Information Systems Security Strayer University CIS 333 June 18, 2014 David Bevin Information Systems Security The scope of our assignment as an information officer at Whale Pharmaceuticals is to safeguardour daily operations which require a combination of both physical and logical access controls to protect medication and funds maintained on the premises and personally identifiable information and protected health information of our customers. The immediate supervisor has tasked us with identifying inherent risks associated with this pharmacy and establishing physical and logical access control methods that will mitigate all risks identified. There are few basic things to be cognizant of as we carry out this task. Security is easiest to define by breaking it into pieces. An information system consists of the hardware, operating system, and application software that work together to collect, process, and store data for individuals and organizations. Information systems security is the collection of activities that protect the information system and the data stored in (Kim & Solomon 2012). We should also be aware of what we are up against. Cyberspace brings new threats to people and organizations. People need to protect their privacy. Businesses and organizations are responsible for protecting both their intellectual property and any personal or private data they handle. Various laws require organizations to use security controls to protect private and......

Words: 3283 - Pages: 14

Premium Essay

Ifsm 370 Project 2: White Paper Instructions

...lancehomework@gmail.com Introduction This is an individual project. Each student must complete a White Paper that proposes a telecommunications solution to address a communications problem for a business organization. The target audience will be the organization’s Chief Information Officer (CIO). The White Paper deliverable is an MS Word document. If you have never written a white paper, you should conduct some research and review sample white papers to understand the content and format associated with these professional documents. The completed White Paper deliverable is due by 11:59 PM Eastern Time on the due date shown in the Course Schedule. See the Additional Information section of the syllabus for the penalty for late or missed assignments and projects. The White Paper is valued at 12% of the course grade. Scenario Ullman, Manly, & Ulysses Corporation With 75,000 customers worldwide, 250 employees working in four locations in the United States and three European offices, and a catalog of more than 100,000 parts, Ullman, Manly & Ulysses Corporation (UMUC) relies on its network for its survival. In the past decade, UMUC has seen its business grow from just one location and a few local customers to the worldwide supplier it is today. But in the process of growing exponentially, it has overwhelmed its telecommunications network, which is currently managed by an outside telecommunications network management company. The network crashes frequently,......

Words: 1357 - Pages: 6

Premium Essay

Is305 Project

...Paul Bettinger Date: October 1, 2013 RISK management PLAN INTRODUCTION 2 PURPOSE AND SCOPE 2 RISK MANAGEMENT PLANNING 3 RISK MANAGEMENT ASSIGNMENTS 6 RISK MANAGEMENT TIMELINE 7 MITIGATION PLAN Introduction 8 Cosiderations 8 Prioritizing 9 Cost benefit analysis 10 Implementation 11 Follow-up 11 Buisness impact analysis Introduction 12 Scope 12 PURPOSE AND objectives 13 Steps of bia 13 final review 15 BUSINESS CONTINUITY PLAN Introduction 16 oBJECTIVES 16 BCP PLANNING 17 PLAN UPDATES AND TRAINING 21 computer incident response team Introduction 22 Purpose 22 elements of the plan 23 incident handling process 23 cirt members 23 detection 24 containment 24 recovery and review 24 cirt policies 25 FINAL THOUGHT RISK MANAGEMENT PLAN INTRODUCTION A risk management plan is a process for identifying, assessing, and prioritizing risks that could cause the company a loss. Identifying these risks, threats and vulnerabilities and taking action to prevent or control them now and in the future. Creating a risk management consists of measuring and prioritizing risks involved and taking actions to reduce any loss the company may encounter. Being that indirectly we work with the Department of Defense, which as you knows is a department of the United States Government dealing with national security, a well-developed risk management plan is of the upmost importance. Without updating our current plan and conforming to newer technologies are......

Words: 5009 - Pages: 21

Premium Essay

Cmgt 442 Entire Course

...standards. Please keep your summary concise (1 paragraph) and include your perspective(s) and conclusion(s). If your source is web based, you may include a hyperlink to the reference website. You may post your article summary at any time during the week. Please provide peer feedback to at least one of your fellow class member’s article summary. CMGT 442 Week 2 DQ 1 Based on the Keston (2008) article, how important is enterprise identity management for reducing risk throughout the enterprise? Explain why a viable risk management strategy must include, at a minimum, a solid enterprise identity management process. CMGT 442 Week 2 DQ 2 DQ 2: Based on the Barr (2009) article, what type of software should be considered to provide adequate security management across the enterprise? Is this a practical solution? Why or why not? CMGT 442 Week 2 Summary This week as we explore risk control models, please summarize two “technology use”...

Words: 1299 - Pages: 6

Free Essay

Assignment 2

...For each malicious attack and threat identified in Assignment 1, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Masquerading – An attacker impersonates an authorized user to capture authentication information for use at a later date, resulting in possible unauthorized access to the network. An impersonation attack may be a replay or may be some other type of attack. Risk mitigation would be the best strategy for dealing with a masquerading attack. As risk mitigation uses various controls to reduce risk. (Janssen, 2013) Social engineering – An attacker uses the weakest link (people) to gain access to secret information by simply asking. This can be done over the phone or email. Compromise of sensitive information is likely to occur. Social networking websites can reveal a large amount of personal information, including resumes, home addresses, phone numbers, employment information, work locations, family members, education and photos. Social media websites may share more personal information than users expect or need to keep in touch with friends making them vulnerable to identity theft or other crimes. Risk avoidance would be the best strategy for dealing with a social engineering attack. (Roman, 2013) Phishing – Attackers use email to trick an individual into giving up private information such as financial information through a link to a fake website. When a user logs onto the fake Web site,......

Words: 622 - Pages: 3

Premium Essay

Is427: Unit 3 Assignment 2: It Security Compliance and Governance Gap Analysis Plan Outline

...IS427: Unit 3 Assignment 2: IT Security Compliance and Governance Gap Analysis Plan Outline Learning Objectives and Outcomes  You will learn about the process of performing an information technology (IT) security compliance and governance gap analysis. Assignment Requirements In this assignment, you will be given a Request for Proposal (RFP) that includes a current IT policy framework description and a complete technical description of what is needed. You are required to prepare a project plan that defines the tasks necessary to perform a security compliance and governance gap analysis. You should include tasks, resources, cost estimates, and time estimates in the project plan. You will be graded on your ability to break the IT security compliance and governance gap analysis process into manageable parts and then organize them into a project plan. Students who produce a project plan with task details for all necessary tasks in an IT security compliance and governance gap analysis should receive a full grade. Required Resources   RFP Worksheet: Project Plan IT Security Compliance and Governance Gap Analysis Submission Requirements     Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Self-Assessment Checklist   I have prepared a project plan that defines the tasks necessary to perform a security compliance and governance gap analysis. I have included tasks, resources, cost estimates, and...

Words: 322 - Pages: 2

Premium Essay

Week 1 Assignment 1

...Week 1 Assignment 1 Michael Conley ITT Technical Institute Abstract This paper will be identifying, analyzing, and explaining five likely threat/vulnerabilities for the scenario given. I will go into detail on what you should do to lower the risk or vulnerability. The last thing I will talk about in this paper is what you should do to try and make it better and more secure. There are definitely some potential risks and vulnerabilities with the given scenario. The first one to point out would be that they are using Windows Vista. Another issue is the VPN connection with the laptops. Issue number three would be the servers. The fourth problem I foresee is back up. The final problem I see in the network is with the ISP. This is not a very old and outdated OS, since Microsoft is still supporting it, but there are more vulnerabilities with using Vista as opposed to Windows 7. Windows 7 is also more versatile, it is able to be run on more than just desktops unlike Vista. Windows 7 is able to be used on laptops, desktops, and netbooks which Vista cannot be used on all of those. Windows 7 puts all of the security notifications and other system problems in one place unlike Vista where you have to search through the control panel to find things. Windows 7 you just go to the action center. The likelihood of there being a serious security issue with windows Vista is low for right now.......

Words: 1019 - Pages: 5

Premium Essay

Preparedness and Mitigation Plan Analysis

...The organization chosen for this assignment the British Columbia Institute of Technology. It is one of the British Columbia’s largest post-secondary institutions with more than 48,000 students enrolled. They provide degrees, diplomas, and certificates in Applied and Natural Sciences, Engineering, and Health Sciences and Trades. The campus was established in 1964. They have five different campuses throughout the British Columbia. This type of organization because of a job working at a campus with the security department. Having mitigation plan can be very important because of the amount of students that are on the campus they need to feel safe in their environment. In the critical incident management plan that the campus defines the authority, defines the terminology used in plan and in critical incidents, it also defines procedures for the delivery of timely response to incidents, and also defines the roles and responsibilities given to everyone. A brief over view of the critical incident plan involves critical incident reporting which should ideally be reported as soon as possible to a supervisor. The critical Incident action plan for the British Columbia Institute of Technology assumes immediate response, this includes police and fire. Then the plan has employee development along with the communication part of the plan, this is where pre incident communication will involve educating the staff and students. The next step of the incident plan involves Incident......

Words: 725 - Pages: 3

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9:......

Words: 18421 - Pages: 74

Premium Essay

Information Systems

...SEC 310 Homeland Security Organization and Administration 2/4/2013 A computer attack may be defined as actions directed against computer systems to disrupt equipment operations, change processing control, or corrupt stored data. Different attack methods target different vulnerabilities and involve different types of weapons, and several may be within the current capabilities of some hacker groups. A general overview of these attacks can be categorized into a physical, electronic, or computer network attack. These attacks could actually prove more damaging because they involve disruptive technologies that might generate unpredictable consequences or give an adversary unexpected advantage. A physical attack involves conventional weapons directed against a computer facility or its transmission lines and can cause much damage to the infrastructure of our company. For an electronic attack it uses the power of electromagnetic energy as a weapon, but more commonly as an electromagnetic pulse to overload computer circuitry in a less violent form in order to insert a stream of malicious digital code directly into an enemy radio transmission. Finally, for a computer network attack this usually involves malicious code used as a weapon to infect enemy computers so that it can exploit a weakness in software in system configuration or in the computer security practices of an organization. It will be of interest to information resource managers, computer security officials, and......

Words: 1189 - Pages: 5

Free Essay

Nt2580

...Unit 2 Assignment 2 Microsoft Environment Analysis 1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them. 2755801, 2719662, 2854544, 2846338, 2847140. 2. Do any vulnerabilities involve privilege elevation? Is this considered a high-priority issue? 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority. 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Three vulnerabilities and Solutions related to client configurations. * Vulnerabilities- ActiveX Controls and Active Scripting. Many websites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. * Solution- After you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted websites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. * Vulnerabilities- Software code execution * Solution- Enhanced Mitigation Experience Toolkit (EMET) helps mitigate the exploitation of this vulnerability by adding......

Words: 455 - Pages: 2