Network and information security - assignment

Added on - 24 Apr 2021

  • 16

    Pages

  • 3993

    Words

  • 4

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 16 pages
Running head:NETWORK AND INFORMATION SECURITYNetwork and Information SecurityName of the StudentName of the UniversityAuthor Note
1NETWORK AND INFORMATION SECURITYTable of Contents1. Executive Summary.....................................................................................................................21. 1AO World plc.......................................................................................................................22. Security Assessment Report........................................................................................................32. A Team Members....................................................................................................................32. B. Identification of Critical Assets, Threat and Vulnerability Assessment, Risk....................42. C. Prioritised List of Issues......................................................................................................83. Business Continuity Plan...........................................................................................................113. A. Introduction.......................................................................................................................113. B. Description of Continuity Plan.........................................................................................113. C. Security Policy..................................................................................................................134. References..................................................................................................................................14
2NETWORK AND INFORMATION SECURITY1. Executive SummaryThe aim of this report is to address the issues and challenges being faced by the AOworld plc organization considering the last IT installation and the operations involved within theactivities of the organization. Since the organization is based on online services, it has become aconsiderable factor for addressing the vulnerabilities related to the challenges and issues in thesecurity of the network. The organization collects many personal and sensitive information of theclients and those data or information are vulnerable to cyber-attack or intrusion. The attempt ofthis report is to identify the sectors which can be used to affect the integrity, availability,, andconfidentiality of the system. The presented security assessment report will be helpful in creatingthreat profiles of the possible and already identified threats related to the proper and effectivefunctioning of the organization. The security risks associated with the application of the networkfor the exchange and execution of the operational activities within the AO world can be listed as:Security breaches, data loss, viruses, hacking, and malicious attacks. Virtual Private Networkadoption can be helpful for the staffs and the employees to access the data or information savedin the network during off-site. This approach can be helpful in securing the links and protectingthe information being exchanged. This report provides an overview of the chosen organization asa case study and based on the thorough research over the organization a security assessmentreport has been presented. This report is capable of addressing the risks and issues through theapplication of the OCTAVE methodology in manner to identify the effective threats and issuesand present a relative solution for the identified threats.
3NETWORK AND INFORMATION SECURITY1. 1AO World plcAO World plc has been one of the leading online retailer company that is providingvarious domestic appliances to the citizens of the UK through online platform. Mr. John Robertsfounded it in the year 2000 and has implemented latest information technologies for theexecution of the operational activities of the organization [3]. The transformation wasimplemented during 2013, when the organization had invested a big amount for theestablishment on new information technology in manner to deliver the products and services tothe UK citizens.2. Security Assessment ReportThe security assessment report presented in the following paragraphs has been conductedthrough the application of the OCTAVE methodology (Operationally Critical Threat, Asset andVulnerability Evaluation). It is helpful in systemization and enhancement of the identifiedsecurity risks those have been analysed and identified in the following security risk assessment[10]. This report will be helpful for the AO to retrieve the sufficing results considering theevaluation of the security despite of using the funds and resources excessively. The proposedmethodology will be utilizing the valuable human resources of the AO for the collection ofinformation related to the security issues and improving them for the better an effective handlingof the data or information saved in the system [2]. The information will gathered from thefollowing personals of the organization:According to Software Engineering Institute, OCTAVE “is designed to allow broadassessment of an organization’s operational risk environment with the goal of producing morerobust results without the need for extensive risk assessment knowledge [4].”
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document