Preview

Se578 Course Project - Logistix Inc Risk Assessment Report

Powerful Essays
Open Document
Open Document
2643 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Se578 Course Project - Logistix Inc Risk Assessment Report
| Logistix Inc. Risk Assessment Report | SE578 - Practices for Administration of Physical & Operations SecurityKeller Graduate School of ManagementPREPARED BY: PREPARED ON: APRIL 9, 2011 | | Over the past several weeks an assessment of Logistix Information Security posture has been under review from the perspective of both an insider looking out hoping to protect the organizations information assets and as an outside looking in attempting to gain unauthorized access to the organizations information assets. The overall objective of this assessment is to get a clear and concise picture of the organizations security posture and determine where any and all potential vulnerabilities lie, determine who might exploit the vulnerability, the likelihood that these vulnerabilities would be exploited, the impact that the organization would suffer as a result of these vulnerabilities being exploited and the recommended courses of actions that the organization could take to mitigate these risks. This document outlines some of the most significant vulnerabilities that Logistix Inc. faces from the perspective of a hacker attempting to gain unauthorized access as well as outlines some recommended courses of action that the organization can take to mitigate those risks. In addition, this document also contains a simple Risk Assessment Matrix that summarizes the identified risks, their threat to the organization and the related courses of action that will need to be taken to mitigate the exposure of the risk. The first risk to Logistix that has been identified is the use of an unsecure FTP server. Through the uses of an unsecure FTP all information that is transmitted is sent in clear text. This includes any usernames and passwords that are used for authentication. Since this information is allowed to be transmitted over the public Internet anyone attempting to gain unauthorized access to the organization can use free utilities to intercept traffic between the FTP


References: Bayles, A., Butler, K., Collins, A., Meer, H., Miller, E., Phillips, G. M., et al. (2007). Penetration Tester 's Open Source Toolkit (Vol. II). Burlington, MA: Syngress Publishing Inc. F.Tipton, H. (2010). Official (ISC)2 Guide to the CISSP CBK, Second Edition. Boca Raton, FL: Auerback Publications. Harris, S. (2010). CISSPAll-in-One Exam Guide, Fifth Edition. New York, NY: McGraw-Hill. Mallery, J., Zann, J., Kelly, P., Noonan, W., Seagren, E., Love, P., et al. (2005). Hardening Network Security. New York, NY: McGraw-Hill. McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill. Miller, L., & Gregory, P. H. (2010). CISSP for Dummies. Hoboken, NJ: Wiley Publishing.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    3. From a career perspective, which professional certifications make sense for someone wishing to perform intrusive, penetration tests?…

    • 814 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    • An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009)…

    • 505 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    References: Ortmeier, P.J. 2009. Introduction to Security: Operations and Management. (3rd ed). Upper Saddle River, N.J.: Pearson Prentice Hall…

    • 1495 Words
    • 6 Pages
    Better Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Grid Computing

    • 3148 Words
    • 13 Pages

    Grid Designing Abstract: In an increasing number of scientific disciplines, large data collections are emerging as important community resources. Grid computing has emerged as an important new field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and, in some cases, high performance orientation. The foundation of a grid solution design is typically built upon an existing infrastructure investment. However, a grid solution does not come to fruition by simply installing software to allocate resources on demand.…

    • 3148 Words
    • 13 Pages
    Powerful Essays