Preview

Technical Paper

Powerful Essays
Open Document
Open Document
2659 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Technical Paper
center23002311409410012100center818008227695Goodman, Jeremy
Yaw Frimpong, Ph.D.CIS 502 Theories of Security Management
September 1, 2014
941009200Goodman, Jeremy
Yaw Frimpong, Ph.D.CIS 502 Theories of Security Management
September 1, 2014 center700007040880Abstract Risk Assessment for Global Finance, Inc. Network.
9410010000Abstract
Risk Assessment for Global Finance, Inc. Network.

-5715003009900Week 10 Technical PaperRisk Assessment
036300Week 10 Technical PaperRisk Assessment
Introduction
Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.
Risk Assessment Purpose
The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included



References: BIBLIOGRAPHY Gregory, P. (2009). CISSP Guide to Security Essentials. Cengage Learning. Lin, C. (2005, September). PSTN (public switched telephone network). Retrieved from TechTarget: http://searchnetworking.techtarget.com/definition/PSTN Network Computing. (2012, March 22). Flat Network Strength Also A Security Weakness. Retrieved from Information Week Network Computing: http://www.networkcomputing.com/networking/flat-network-strength-also-a-security-weakness/d/d-id/1233495? Olzak, T. (2012, April 18). VLAN Network Segmentation and Security. Retrieved from Infosec: http://resources.infosecinstitute.com/vlan-network-chapter-5/ Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100. Shelly, G., & Rosenblatt, H. J. (2011). Systems Analysis and Design, Ninth Edition. Cengage Learning.

You May Also Find These Documents Helpful

  • Better Essays

    References: Dennis, Alan, Systems Analysis and Design, 4e, John Wiley & Sons, Inc. copyright 2009…

    • 3711 Words
    • 15 Pages
    Better Essays
  • Satisfactory Essays

    Global Limited has a reputation of being one of the world’s leading providers of infrastructure information systems, software, and services around the world. They are in need of a better business and security practices. They have identified a problem which has been likened to a game of Whack-a-mole. To help with its security problem, Global as called upon the knowledge of CIS-its own Security Division. One of the first steps is to understand what information is critical to the business initiatives. Global Cadence is front-end for over 40 applications and has for 200,000 registered users. Global is working to minimize its impact.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Valacich, J. S., George, J. F., & Hoffer, J. A. (2012). Essentials of System Analysis and Design (5th ed.).…

    • 1465 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    Valacich, J. S., George, J. F., & Hoffer, J. A. (2009). Essentials of Systems Analysis and Design (4th ed.). Upper Saddle River, NJ: Prentice Hall…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Kudler Fine Foods

    • 1782 Words
    • 8 Pages

    Valacich, J., George, J. F., & Hoffer, J. A. (2012). Essentials of Systems Analysis and Design (5th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 1782 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Network Security Policy: Best Practices White Paper - Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Better Essays

    KUDLER FINE FOODS

    • 3315 Words
    • 14 Pages

    References: Valacich, J. S., George, J. F., & Hoffer, J. A. (2012). Essentials of systems analysis and…

    • 3315 Words
    • 14 Pages
    Better Essays
  • Better Essays

    Shelly, G. B., & Rosenblatt, H. J. (2010). _Systems analysis and design_. Boston, MA: Course Technology.…

    • 869 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Final

    • 6639 Words
    • 27 Pages

    George, J. F., Hoffer, J. A., & Valacich, J. S. (2009). Essentials of System Analysis and Design…

    • 6639 Words
    • 27 Pages
    Powerful Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Global Finance

    • 3344 Words
    • 11 Pages

    References: Acharya, V., Lasse H., Thomas P., & Matthew R. (2011). Measuring Systemic Risk, Working…

    • 3344 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Grid Computing

    • 3148 Words
    • 13 Pages

    Grid Designing Abstract: In an increasing number of scientific disciplines, large data collections are emerging as important community resources. Grid computing has emerged as an important new field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and, in some cases, high performance orientation. The foundation of a grid solution design is typically built upon an existing infrastructure investment. However, a grid solution does not come to fruition by simply installing software to allocate resources on demand.…

    • 3148 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Spss Tutorial

    • 15972 Words
    • 64 Pages

    The occurrence of outages due to failures in today’s information technology infrastructure is a real problem that still begs a satisfactory solution. The backbone of the ubiquitous information technology infrastructure is formed by distributed systems—distributed middleware, such as CORBA and DCOM; distributed file systems, such as NFS and XFS; distributed coordination-based systems, such as publish-subscribe systems and network protocols; and above all, the distributed infrastructure of the World Wide Web. Distributed systems support many critical applications in the civilian and military domains. Critical civilian applications abound in private enterprise, such as banking, electronic commerce, and industrial control systems, as well as in the public enterprise, such as air traffic control, nuclear power plants, and protection of public infrastructures through Supervisory Control and Data Acquisition (SCADA) systems. The dependency dramatically magnifies the consequence of failures, even if transient. There is little wonder that distributed systems, therefore, are called upon to provide alwaysavailable and trustworthy services. The terminology that we will use in this chapter is to consider the distributed systems as composed of multiple services and the services interact with one another through standardized network protocols. Consider, for example, a distributed e-commerce system with the traditional threetier architecture of a web server, application server, and database server. The services are typically located on multiple hosts. The importance of distributed systems has led to a long interest in securing such systems through prevention and runtime detection of intrusions. The prevention is traditionally achieved by a system for user authentication and identification (e.g., users log in by providing some identifying information such as log-in signature and password, biometric information,…

    • 15972 Words
    • 64 Pages
    Better Essays