Preview

IS3110 PP1T

Satisfactory Essays
Open Document
Open Document
777 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 PP1T
Defense Logistics Information Services
(DLIS)
A Department of the Defense Logistics Agency
Tom Fletcher, Dave Kobol, Alejandro, Aliue

Risk Assessment

1.1 Purpose
This plan documents the processes, tools and procedures that will be used to manage and control those events that could have a negative impact on DLIS. It’s the controlling document for managing and controlling all project risks. This plan will address:
• Risk Identification
• Risk Assessment
• Risk Mitigation
• Risk Contingency Planning
• Risk Tracking and Reporting
Appendix A will present the risk impact assessment matrix and appendix B will present a sample of the risk register.
1.1 Introduction
With the development of computer networks, the spread of malicious network activities poses great risks to the operational integrity of many organizations and imposes heavy economic burdens on life and health. Agencies within and those that supports the federal government are particularly at substantial risk for cyber attacks. Therefore, risk assessments are very important for network security management and analysis. The DLIS systems that connect via LAN and WLAN with the DLA network will be within the scope of this assessment.
1.2 Scope
The scope includes the DLIS information systems and network. It also includes the personnel operating with the DLIS information systems and network. These personnel and upper management are responsible for the implementation and maintenance of the recommendations made herein. Further, the boundaries include the DLIS information systems including the information stored digitally and transmitted within the network components. Critical areas are the web, databases and firewalls.
2 Roles and Schedule

2.2 Risk Responsibilities
The responsibility for managing risk is shared amongst all the stakeholders of the project. However, decision authority for selecting whether to proceed with mitigation strategies and implement contingency actions, especially those

You May Also Find These Documents Helpful

  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Is3350 Unit 5

    • 880 Words
    • 4 Pages

    Electricity at work Regulations 1989. This legislation places the4 responsibility of electrical item on to the employer.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS3110 P2T1 BIA

    • 653 Words
    • 4 Pages

    DLIS environment consists of more than 5,000 employees and 5,000 contractor. The IT environment contains assets that enable business functions like exchange, active directory, user PCs, Information Databases such as Customer databases, employees/contractors and parent company databases. These assets enable communication between the organization and clients such as the Department of Defense have a high priority as the DLA exists solely for the DoD and its subsidiaries. As the logistics are handled by the DLA, it has a major impact of the ability of the DoD to wage and win wars.…

    • 653 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110

    • 382 Words
    • 2 Pages

    Install a backup service that will provide onsite and off-site backup solution for all data on the servers.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is3350 Unit 4

    • 2336 Words
    • 10 Pages

    Giving problems in staff meeting so every staffs know this situation and they can also know their risk.…

    • 2336 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3120 Ass 1

    • 330 Words
    • 2 Pages

    The Johnson Company will be able to reach out to its customers by basically creating a good “Web Page” where customers will be able to find all of their products and also pay online and order online. In addition orders will not be taken by hand anymore but online orders will be the main method used to order networking products.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    This is a lot like hardening the OS in respect that you are making sure that software stays up to date to ensure that known exploits are being addresses. Any unnecessary applications, services, or scripts that are installed should be removed immediately once the installation process is complete. Below are some things that you can do to harden software.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    For this kind of scenario, I would have to create a server from scratch so I can be able to identify any types of vulnerabilities on any of these server requirements stated below. Any of these can be at risk at any time, so creating a new server from scratch would be most recommended. Because it is kind of safer than Windows because most viruses and worms are written for Windows but it doesn’t mean Linux can be attacked.…

    • 364 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This plan as sanctioned by senior management of the DLIS will cover compliance laws and regulations that pertain to our organization. It will identify key roles and responsibilities of individuals and departments within the organization as they pertain to risk management. It will develop a proposed schedule for risk management’s planning process, and finally it will deliver a professional report detailing the information above for any interested parties.…

    • 566 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    pm 586 week 5

    • 428 Words
    • 3 Pages

    A risk assessment is needed to be able to identify the potential of each risk, the likelihood, the impact and the detection for each risk event. “To determine whether the identified risks could impact the success of the project, each risk was given a score of either 1 (very low), 2 (Low), 3 (Moderate), 4 (High), and 5 (Very High) in the areas of likelihood of risk occurring and risk impact on the project. The detection difficulty was scored using a scale ranging from 1 (no warning time), 2 (low warning time), 3 (moderate warning time), 4 (high warning time), and 5 (extremely high warning time). A higher score provides more time to identify and mitigate or respond to the issue.”…

    • 428 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3120 Unit 3

    • 650 Words
    • 2 Pages

    speeds of at least 100 megabits per second and actual upload speeds of at least 50…

    • 650 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    * Risk Treatment/Mitigation: Develop mitigation plans for risk areas where the residual risk is greater than tolerablerisk levels; and…

    • 1472 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    assessment 1

    • 1128 Words
    • 5 Pages

    You must identify potential risks to a specific project planed develop a risk plan to monitor and control risks effectively, identifying preventative and contingent actions to prevent the risk from occurring or reduce its impact, to increase the chances of achieving project success.…

    • 1128 Words
    • 5 Pages
    Better Essays