Ask a question from expert

Ask now

Auric Enterprises Threat and Vulnerability Analysis Assignment

13 Pages3111 Words356 Views
   

Added on  2020-04-01

Auric Enterprises Threat and Vulnerability Analysis Assignment

   Added on 2020-04-01

BookmarkShareRelated Documents
Running head: AURIC ENTERPRISES THREAT AND VULNERABILITY ANALYSISAuric Enterprises Threat and Vulnerability AnalysisName of the StudentName of the UniversityAuthor’s note
Auric Enterprises Threat and Vulnerability Analysis Assignment_1
1AURIC ENTERPRISES THREAT AND VULNERABILITY ANALYSISAbstractAuric Enterprise carries out metallurgical and mining operations in Central Australia. Theyshould adopt the cloud platform provided by Microsoft Office 365 to carry out their businessactivities on the cloud.The threats associated with adopting the cloud technology have beendiscussed in this report. Also, the vulnerabilities or the weakness of the cloud technology hasbeen detailed in the report as well. The threats like data breaches, intruders attack, inadequatediligence have been elaborated. The threats associated with SCADA systems have beenshowcased thus a detailed insight or the overview of the company’s business activities can bereceived. Finally, the control measures to diminish those mentioned threats have beenmentioned.
Auric Enterprises Threat and Vulnerability Analysis Assignment_2
2AURIC ENTERPRISES THREAT AND VULNERABILITY ANALYSISTable of Contents1. Introduction............................................................................................................................22. Threats....................................................................................................................................2i. Data Breaches.....................................................................................................................2ii. Malicious insiders..............................................................................................................3iii. Intruder attack and permanent data loss...........................................................................3iv. Inadequate diligence.........................................................................................................4v. Threats related to SCADA System....................................................................................43. Vulnerabilities........................................................................................................................44. Control measures....................................................................................................................7i. Avoiding data protection.....................................................................................................7ii. Avoiding malicious insiders..............................................................................................7ii. Mitigating intruder attack and permanent data loss...........................................................7iv. Mitigating inadequate diligence........................................................................................8v. Control over SCADA systems...........................................................................................85. Conclusion..............................................................................................................................86. References............................................................................................................................10
Auric Enterprises Threat and Vulnerability Analysis Assignment_3
3AURIC ENTERPRISES THREAT AND VULNERABILITY ANALYSIS1. IntroductionAuric Enterprise conducts metallurgical and mining operation in Australia. They wantto move to the cloud to enhance their business activities for good [2]. They should adopt thecloud platform provided by Microsoft Office 365 to carry out their business activities on thecloud.This report will highlight the threats and the vulnerabilities that Auric can face whilemoving to the cloud platform. Also, the control measures to mitigate those risks will beshowcased.2. ThreatsAuric Enterprises want to move to the Cloud as they want to enhance the businessactivities and also want to carry out their business activities in a secure manner [4]. They useIPv4 internet connectivity and a strong up-to-date firewall, however, if they migrate to thecloud they will have to face threats which must be addressed. At first, there is a chance ofgetting data breaches.i. Data BreachesThey use the MSSQL databases for storing the sensitive secretive data of theircustomers in their database. After migrating to the cloud, their cloud database will becontrolled by third-party cloud vendor, if their database gets compromised then Auric willhave to face devastating consequences [7]. Auric will have to pay fines of about $10,000,000.The data breach will also affect their brand name. They will lose reputation; they will lose thebrand name. They will lose the customer base as well. Since they are opting to move toMicrosoft Azure cloud platform, Auric will not have total control over their data, Microsofteven has the privilege to access the data, so the data is not cent percent authenticated [3].Even though they use strong up-to-date firewall the risks still reside within.
Auric Enterprises Threat and Vulnerability Analysis Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Application of Risk Mitigation and Planning Tools
|3
|830
|42

Private Cloud
|9
|2165
|499

Change Management Plan for Sunoco Inc. to Move to Cloud-based Data
|13
|3401
|60