Preview

Risk Threats And Vulnerabilities Project 1

Good Essays
Open Document
Open Document
1033 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Threats And Vulnerabilities Project 1
Risk Threats And Vulnerabilities
Marisel Hernandez
Professor Julian Slaughter
Foundations of Cyber Security
July 6, 2015

Assessing risk, threats, and vulnerabilities
Focus on the problem as soon as it occurs
The severity of the companies security impact due to the data breach
Investigation on the severity of incident and its damages
Actions taken towards this threat
Insights of similar incident
Requirement policies
Identifying reports
Actions that need to be taken
Outcomes and results due to malware attack
Consequences of the attack
Impact of possible exposure to incident
How to prevent future incidents

As we already know Fullsoft Inc, has recently experienced a malware attack that has resulted in proprietary information being leaked. Even though the company is now in the process of this breach being recovered, we will need to come up with a plan so we can prevent such incident of happening again.
[Us as] security professional need to be aware of common attack methods so that they can take proactive steps to prevent attacks [by recognizing] them when they occur and respond [to them] appropriately (James M. Stewart, p. 48).
In order for such incidents to occur again in the future one must have risk management strategies in place. According to the Risk Centric Threat Modeling: Process for Attack Stimulation and Threat Analysis Tony Uceda Velez and, Marco M. Morana state, “A risk management strategy of the company can be proactive or reactive depending on the culture and appetite of the risk (Morana Marco M, 2015, p. 66).”
One must first focus on the problem as soon as it has occurred. Secondly how severe was this companies security impacted such as the security of the incident data breach. A full investigation on the severity of this incident and the measures of all the damages has to be made.
An action plan is to take place by suspending any accounts associated with the threats to this company, such as credit cards, and or blocking credentials



Cited: Coombs, W. T. (2007). PSI Handbook of Business Security. James M. Stewart, M. C. CISSP- Certified Information Systems Security Profession Study Guide (Vol. 6th ed). Lobel Mark, G. L. (n.d.). Retrieved from www.pwc.com/giss2012. Morana Marco M, T. U. (2015). Risk Centric Threat Modeling: Process for Attack Stimulation and Threat Analysis.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Better Essays

    [Company] has been contracted to conduct a penetration test against [Organization] external web presence. The…

    • 1355 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    With a good plan in place, we would also conduct the cost of each occurrence and the affect it would have financially. Mitigation plans are as good as we make them. With this mitigation plan the company may address the problems at hand. With all risks we have to take in consideration the impact it would have on our integrity, and confidentiality. The main risk would be an internal risk. Our staff may intentionally or unintentionally want to disrupt the organization. Certain controls have to be placed in order to mitigate the risks, such as access controls, being physical or non-physical. These would help us in the event of an occurrence of a risk. We can pre form a cost analysis of our plan to see what value to the company each risk has. To do that we would use a threat impact matrix, that would let us decipher our cost versus the likelihood of a risk to happen.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Jackson, Brian A. and David R. Frelinger. Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About? Washington, DC: RAND Corporation, 2009.…

    • 17193 Words
    • 69 Pages
    Powerful Essays
  • Satisfactory Essays

    This assignment allows you to fulfill the role of an IT manager in a small business tasked with determining…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Organizations must ensure the security and control of systems and transactions with clients and vendors. What security breaches may cause harm to an organization or its clients? Why is it important to ensure a proper level of security? What tools are available to prevent breaches?…

    • 369 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Terrorist Funding

    • 536 Words
    • 3 Pages

    References: 1. Oliver, W M., Combs, C.C., Poland, J.M., Fagin, J.A. (2007) Homeland Security: Responding to the Threat. Pearson Education Inc.…

    • 536 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Sanlu Milk Research Report

    • 3800 Words
    • 16 Pages

    In the case of avoiding the same thing happens again and protect the social peaceful, it is important to know what went wrong in the enterprise and how to put it right.…

    • 3800 Words
    • 16 Pages
    Best Essays

Related Topics