Risk assessment plan homework help
WE WRITE ESSAYS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your project
Write My Essay For MeThe purpose of this assignment is to
allow you to create a draft risk assessment plan. The draft is an outline.
Scenario
You are an information
technology (IT) intern working for Health Network, Inc. (Health Network), a
fictitious health services organization headquartered in Minneapolis,
Minnesota. Health Network has over 600 employees throughout the organization
and generates $500 million USD in annual revenue. The company has two
additional locations in Portland, Oregon, and Arlington, Virginia, which
support a mix of corporate operations. Each corporate facility is located near
a co-location data center, where production systems are located and managed by
third-party data center hosting vendors. The organization does not have a
business continuity plan, but it should since it has four locations.
Company products: Health Network has three main products: HNetExchange,
HNetPay, and HNetConnect.
HNetExchange is the primary source of
revenue for the company. The service handles secure electronic medical messages
that originate from its customers, such as large hospitals, which are then
routed to receiving customers such as clinics.
HNetPay is a Web portal used by many of
the company’s HNetExchange customers to support the management of secure
payments and billing. The HNetPay Web portal, hosted at Health Network production
sites, accepts various forms of payments and interacts with credit-card
processing organizations much like a Web commerce shopping cart.
HNetConnect is an online directory that
lists doctors, clinics, and other medical facilities to allow Health Network
customers to find the right type of care at the right locations. It contains
doctors’ personal information, work addresses, medical certifications, and
types of services that the doctors and clinics offer. Doctors are given
credentials and are able to update the information in their profile. Health
Network customers, which are the hospitals and clinics, connect to all three of
the company’s products using HTTPS connections. Doctors and potential patients
are able to make payments and update their profiles using Internet-accessible
HTTPS websites.
Information technology
infrastructure overview: Health
Network operates in three production data centers that provide high
availability across the company’s products. The data centers host about 1,000
production servers, and Health Network maintains 650 corporate laptops and
company-issued mobile devices for its employees.
Threats identified: Upon review of the current risk management plan, the
following threats were identified:
loss of company data due
to hardware being removed from production systems;
loss of company
information on lost or stolen company-owned assets, such as mobile devices
and laptops;
loss of customers due to
production outages caused by various events, such as natural disasters,
change management, unstable software, and so on;
Internet threats due to
company products being accessible on the Internet;
insider threats; and
changes in regulatory
landscape that may impact operations.
Instructions
Create a draft of the risk assessment
(RA) plan. Hint: A sample risk assessment outline can be found on page 129 of
your textbook. To complete this assignment, you must include the following.
Develop an introduction to
the plan explaining its purpose and importance.
Create an outline for the
RA plan.
Define the scope and
boundaries for the RA plan.
Research and summarize RA
approaches.
Identify the key roles and
responsibilities of individuals and departments within the organization as
they pertain to risk assessment.
Develop a proposed
schedule for the RA process.
Create a professional
report detailing the information above as an initial draft of the RA plan.
Your assignment must be at least one page
in length and must not exceed two pages. You must use at least two sources. One
source must be from the CSU Online Library; the other may be your textbook.
Your assignment, including in-text citations and references, must be in APA
style.
Page 129.
Risk Assessment Challenges
When completing any risk assessment, you have several
challenges to address and overcome. Many of these are dependent on the type of
assessment you choose. Both the quantitative and qualitative assessments have
their own challenges. These were listed in the previous section as limitations.
There are several additional challenges. These include:
• Using a static process to evaluate a moving
target
• Availability of resources and data
• Data consistency
• Estimating impact effects
• Providing results that support resource
allocation and risk acceptance
These challenges are explored in the following sections.
Using a Static Process to Evaluate a Moving Target
As mentioned previously, the RA is a point-in-time
assessment. It evaluates the system against known risks at a specific time. It
considers the risks based on current controls. In other words, the RA is a
static process. However, security is not static. Risks can and do change.
Attackers and attacks are constantly changing. Security does not stand still.
As attackers become successful at any attack, security
experts implement controls. At some point, these attacks are less successful.
Attackers then learn new methods of attack. Security experts modify the
controls or implement new controls. The battle continues daily.
Some threats and vulnerabilities look as if they’ve been
mitigated successfully and no longer present a risk. Then, they suddenly appear
as another threat. Domain Name System (DNS) cache poisoning is a good example.
DNS cache poisoning can cause a system to resolve a Web site name to a bogus
Internet Protocol (IP) address. Users may try to access Acme.com with a Web
browser. Instead, they are redirected to Malware4u. com. DNS cache poisoning
was identified years ago as a significant threat. It was successfully mitigated
and fell into disuse. From an IT security perspective, it almost became a
historical footnote.
Then in the summer of 2008, a flaw was discovered and
published by Dan Kaminsky. Quick as a flash, DNS cache poisoning was once again
an issue. Once the results were published, attackers quickly learned how to
exploit the vulnerability. DNS cache poisoning was once again raised as a
serious concern. Security controls addressed this flaw, and DNS cache poisoning
became rare again.
If your RA was completed in March, but a vulnerability is
announced in June that affects your system, the validity of the assessment is
affected. For this reason, you’ll need to be aware of new risks as they become
known.
Risk assessment plan homework help ESSAY
Write my Essay. Premium essay writing services is the ideal place for homework help or essay writing service. if you are looking for affordable, high quality & non-plagiarized papers, click on the button below to place your order. Provide us with the instructions and one of our writers will deliver a unique, no plagiarism, and professional paper.
Get help with your toughest assignments and get them solved by a Reliable Custom Papers Writing Company. Save time, money and get quality papers. Buying an excellent plagiarism-free paper is a piece of cake!
All our papers are written from scratch. We can cover any assignment/essay in your field of study.
