Risk Assessment for CloudXYZ Company using ISO/IEC 27001 Management of Information Security
Verified
Added on  2023/06/08
|15
|3591
|117
AI Summary
This report provides a risk assessment for CloudXYZ Company using ISO/IEC 27001 Management of Information Security. It includes a deep understanding of the company's risk calculation procedure, asset and threat identification, vulnerability analysis, and risk management techniques.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
CO4512 INFORMATION SECURITY MANAGEMENT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ABSTRACT The report will contain a deep understanding of the CloudXYZ Company which have a procedure for the calculation of the risk which uses and follow some rules of ISO. The reason behind performing the risk assessment is to handle the issues of improving the security and management. The potential risk is being calculated for the risk assessment depending on its quality and the quantity of the known threat. The calculation of risk is the main purpose for which any system failure can be avoided. The scenario that has been given over here has a risk assessment that is being conducted for reducing the investment that is being done to improve the system for security for which work could be done for the system in which data could be loss, fraud data could be provided or any privacy statment could be steal. INTRODUCTION ISO is an International Organization for Standardization which consist of a non-dependent, international body that is private and it consist of bodies with 161 national level of standardization. In the year 1947 for the month of February it was founded as the result of having two of the renowned organizations in combination with each other are: 1.United Nations Standard Coordinating Committee (UNSCC) 2.International Federation of National Standardizing Associations The organization aim at easing the industrial standards unifications and the international coordination. The standards of the ISO are as follow: ISO 50001 Energy Management ISO/IEC 27001 Management of Information Security ISO/IEC 17025 calibration and testing laboratory ISO 9001 Quality Management In this assessment we have decided to use ISO/IEC 27001 Management of Information System for the CloudXYZ Company. There are some standards that have a set for ISO/IEC 27001 Management of Information System whose help is there for any organization through which the organization could keep the resources of the organization secure (Hart et al. 2016). With the use of CloudXYZ standardization, the information system could be securely managed as it consists of information for the user data that are stored in the cloud. The CloudXYZ has an authentication server that is accountable to approve the clients’ permits (username/account and password). During the performance of the task authorization, it may happen that there may be interaction between the client database and the authorization server in which the customer data is content. When the verification is done, the right will be provided to the customer so that the can use the data that is stored in the cloud or else log in to the virtual server. The enterprise of CloudXYZ Company will be able to identify the use of ISO/IEC 27001 Management of Information Security for the assessment of the risk that potentially can cause risks of the security threat for the privacy of the user and the data and according to it plan
about the risk where the risk could be eliminated properly and the Company of CloudXYZ meet the security of the information with international standards. The risk assessment will be performed with certain steps that are mention below: 1.The risk could be managed by selecting the right method 2.The evaluation of the system for risk management 3.Risk identification for system analysis 4.After the elimination of the risk the system could be monitor and maintain 5.Implementation for the techniques of risk management Figure 1: risk assessment with five stages
RISK ASSESSMENT The process of risk assessment is to identify the risk, to find the methods through which the risk could be handled, to find the people who are affected from such risk, risk elimination process could be implemented and the system could monitor after eliminatingtherisk through which the best performance could be checked.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The figure that is displayed above proposed a system for which the team provide some security for the system of the CloudXYZ Company. The process of risk assessment produces a results that will have a risks which can cause failure in the security system. OWNER SPECIFICATION In this section of the article the system owner will be specified. The system users are provided below: Visitors that visits the bank Departmant of maintainance Employees Bank Staff Developers Management team of the band The cloud system wanted by the client Team of the Administration Human Resource ASSETS Resource/Asset – Poeple, information and properties. Clients and Representatives were incorporated by the individuals alongside the other people who were welcomed, some of the example like, visitors or contractual workers. There are resources that are both tangible and intangible and comprise of the resources of the property of which an esteem could be relegated. There are exclusive data and notoriety that has incorporated intangible resources. Incorporate the data or information for the database, data for the basic organization, other intangible things that are numerous and programming codes (Smith et al. 2014).
The aim could be achieve by using the asset of the helping object and the resources. This asset could be anything that include people, cash, machines etc. The asset or the resource purpose is providing some profit so that utilizer could get it. There are two types of assets: 1.The Primary assets 2.The Secondary assets There are certain advantages for the primary resources that are transported to import certain sort of benefits. There are default extension of the primary resources that import the writes of other resource. After the primary resources there are advantages transported to secondary resources. The super- arrangement of the primary resources is constitute in the secondary resources. The CloudXYZ Company has a system asset: Asset idAsset NameTypeRemark S1.Mail serverPrimary AssetThe mail server contain all the information about the email that the company receive and send. S2.Web serverPrimary AssetThe website displays all the details of the company. S3.Authentication serverPrimary AssetThe server is being used by the CloudXYZ company were the user is authorized or else permit is given to log in to the system. S4.Customer databasePrimary AssetThe customer details and the relateddataareallsaved here. S5.FirewallSecondary assetThe users filtering is provided overhere.Thesystemis accessbyonlythoseusers that are authorized. S6.Virtual serversSecondary AssetThe virtual server is added just aftertheactualserverson which the extra load could be
handle. S7.Cloud storagePrimary AssetThe CloudXYZ Company main purpose is over the internet, it could provide some storage. The storage is provided to the asset needed by the user. S8.HR PCPrimary AssetThe PC of Human Resources stored some other details of the stuff and details of the staff of CloudXYZ. S9.Visitor PCPrimary AssetThis store the details that are related to visitors. S10.Admin PCPrimary AssetThe web server, mail server andmoredetailswouldbe stored on the admin PC. S11.Staff PCPrimary AssetTherelateddataofthe technical work, the enterprise development details and the relatedinformationofthe staff S12.Visitor phonePrimary AssetThere are details of the brand and the visitors. THREAT The threat could be utilize by harasing the weakness, by intention or by fault, through which the resource could be either find or defect or destroy. The work of any organization or asset could be fully destroy through the organizational threat or it may happen that the enterprise could get collapse. The evaluation of the treats could be either categories as high-level or medium-level or low-level. The system has threat of low level that could basically cause problem in minimum amount. The system that has threat of medium level could cause a little more defect but however both the type of threats could be easily handled. However, the high-level threats cause destruction that are of very large amount for which the organisation could be destroy. The asset of the threats in the CloudXYZ organization: Table 1: table of the assets of the threat Asset nameThreatLevelSOURCE
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Admin PCSystem hacking(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside Spectre(TH3)Medium levelSource is outside Spoofing attack(TH4)Low levelThe outside source has stolen the system information Human Resource PC System hacking(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside Virus(TH2)Medium levelThroughanexternalsource fromoutsidethevirusis getting uploaded Spectre (TH3)Low levelSource is outside Customer PCHacking of system(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside Virus(TH2)Medium levelThroughanexternalsource fromoutsidethevirusis getting uploaded Phishing(TH6)Medium levelAttack from outside Visitor PCSystem hacking(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside Virus (TH2)Medium levelThroughanexternalsource fromoutsidethevirusis getting uploaded Spoofing attack(TH4)Low levelThe outside source has stolen the system information Visitor PhoneSystem hacking(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside Virus(TH2)Medium levelThroughanexternalsource fromoutsidethevirusis getting uploaded Spoofing attack(TH4)Low levelThe outside source has stolen the system information
Customer PhoneSystem hacking(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside Virus (TH2)Medium levelThroughanexternalsource fromoutsidethevirusis getting uploaded Spoofing attack(TH1)Low levelThe outside source has stolen the system information FirewallSystem hacking(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside Not active(TH8)High levelSource is internal as within the organization the activation is done Web ServerJunk mail(TH6)Low levelSource is outside as receiving of mail is from outside Configuration mistakeHigh levelSource is inside as designing of theorganizationsystemis inside Fire(TH7)Low levelNA Mail ServerJunk mail(TH6)Low levelSource is outside as receiving of mail is from outside System hacking(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside FireLow levelSource is outside Cloud StorageSystem hacking(TH1)Low levelSince hacking can be possible fromanywhere,thesource would be outside Authentication Server System hacking(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside Staff PCSystem hacking(TH1)High levelSince hacking can be possible fromanywhere,thesource would be outside Spectre (TH3)High levelSource is outside MeltdownHigh levelSource is outside
VULNERABILITY The stealing or using of the system illegally gain access by harassing the weak points of the security system. There is a reason behind the vulnerability being find or calculated for which the loss is recognise from the risk time for breach. HIGH LEVEL Such risk usually get destroy, misplace or defecetive. Repairing of the asset is not possible at the disturbing state. MEDIUM LEVEL Such type of risk has asset that are partly defects. Depending on the type of defect, the asset could be either in the state of repair or non-repair. LOW LEVEL There is slight defect with very small amount where asset is distributed for just 2 to 4 hours. Table 2 : table of vulnerabilities Asset nameVulnerability No Threat nameThreat levelCVE CodeVulnerability level HR PCVN1System hackingHigh levelCVE-2015-8286High level VN2VirusMedium levelCVE-2015-8993High level VN3SpectreLow levelCVE-2017-5754Medium level Admin PCVN4System hackingHigh levelCVE-2015-8286High level VN5SpectreMedium levelCVE-2017-5753High level VN6Spoofing attackLow levelNALow level Customer PCVN7System hackingHigh levelCVE-2015-8286High level VN8VirusMedium levelCVE-2015-8993High level VN9Phishing attackMedium levelCVE-2015-8286Medium level Visitor PCVN10System hackingHigh levelCVE-2015-8286High level VN11VirusMedium levelCVE-2015-8993High level VN12Spoofing attackLow levelNALow level CustomerVN13System hackingHigh levelCVE-2015-8286High level
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Table 3: Table of Impact Level of ImpactMeaning HIGHThe personal computer and the department of human resource have PCs were records of the accounts,staffofthecompanyandother enterprisefilesthatareprivatehavea possibility that outsiders could hack it to modify, replaceordeletethedetails.Throughthis records, the reputation of the company could be easily exploited. SpectreandMeltdownaresimilarkindof exploitation that are connected for the process to be executed and get access to computer data. The style of all the new processing chip are exploited from the main distributors where the system has all types of computing starting from personalcomputertosmartphonestodata warehouses.Mostly,thereareexploitation whichincludememoryhavingdatalocation which could be read to authorize the kernel access. Inside the system of HR, customers and staff members’ viruses are spread that defect the information. MEDIUMThe system has Meltdowns which is a security breach that are found in the processors. From heretheunauthorizedpersoncouldsteal information without informing the user about it. Meltdown works best in the cloud systems. Suppose the security of the cloud infrastructure is weak, in that case, access to data at any time would be easier for the hacker. Suppose that the company firewall is insure or malwares are strong enough to repel out, then the system could be easily defect by the user who are unauthorized. Theunauthorizedpersonnelorhackerdo phishing in order to get access to user password and username (Arbab-Zadeh and Fuster 2015).
LOWThe peripheral device or the user that are unauthorized spoof the security system that enterinsidethecompanybyapprovingthe username and password. Spoofing has various methods like ARP spoofing, IP spoofing etc. There are emails that contain virus were the system network gets corrupted. The system data can be destroyed by natural disaster which may include flood, earthquake, fire and more. COUNTERMEASURE The hazard such as the virus have a countermeasure that have the possible measurement of handling that the enterprise give for emergency needs. There is a needs of software for malware removal in the abnormal state for the organizaiton that secure the point of interest for the PC. Teh infection of the aggressors infuse the informatin from the friends server or the framwork of the PC. The IP satirizing is the hazards that is recognised by the organization to mock the IP parcels and track the source that is beginning. Distinguishing the spam mail, track the subtle elements of the first sender through header examination, Bait strategies, gadget examination, server examinaiton, and more. The database have unnecessary benefit that are not reliable for the workers. The group of administrator decide not to share username and password to group of unapproved people (Forouzanfar et al 2016). LIKELIHOOD=(THREAT*ATTRACTIVENESS)*VULNERABILITY S9&TH8&VN24 S11&TH1&VN27 S12&TH3&VN30 S3&TH1&VN7 S4&TH1&VN10 S6&TH1&VN16 S1&TH1&VN1 S7&TH1&VN19 S12TH1&VN28 S2&TH1&VN4 S5&TH1&VN13 S12&TH4&VN29 S8&TH2&VN21 S3&TH6&VN9&TH2&VN17 S2&TH5&VN6 S9&TH7&VN25 S4&TH5&VN12 S5&TH5&VN15 S8&TH6&VN20 S8&TH7&VN22 S1&TH3&VN3S10&TH1&VN26 S6&TH5&VN18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
CONCLUSION From the study above CloudXYZ company estimated the risk of using ISO 27005 standard. There are various properties and resources use by the company that analysed the threads of weaknesses. Evaluation of the risk has the advantages in the strings and the organization where the data of the organization is influence. Distinguing the likelihood by danger, contrast, defenseless and later the hazard is discovered by looking at the effect and probability. The hazard are expand by the organization that has a security control. The unique group employ the need of the organization were the security control need to be enhance. The aggressors or unapproved client has not enable the organization which are arrange by the appraisal of the hazard wiht best possible models of ISO. REFERENCES Arbab-Zadeh, A. and Fuster, V., 2015. The myth of the “vulnerable plaque”: transitioning from a focus on individual lesions to atherosclerotic disease burden for coronary artery disease risk assessment.Journal of the American College of Cardiology,65(8), pp.846-855. Forouzanfar, M.H., Afshin, A., Alexander, L.T., Anderson, H.R., Bhutta, Z.A., Biryukov, S., Brauer, M., Burnett, R., Cercy, K., Charlson, F.J. and Cohen, A.J., 2016. Global, regional, and national comparative risk assessment of 79 behavioural, environmental and occupational, and metabolic risks or clusters of risks, 1990–2015: a systematic analysis for the Global Burden of Disease Study 2015.The Lancet,388(10053), pp.1659-1724. Hart, S.D., Douglas, K.S. and Guy, L.S., 2016. The structured professional judgment approach to violence risk assessment: Origins, nature, and advances.L. Craig, & M. Rettenberger (Volume Eds.) and D. Boer (Series Ed.), The Wiley handbook on the theories, assessment, treatment of sexual offending,2, pp.643- 666. Smith, K.R., Bruce, N., Balakrishnan, K., Adair-Rohani, H., Balmes, J., Chafe, Z., Dherani, M., Hosgood, H.D., Mehta, S., Pope, D. and Rehfuess, E., 2014. Millions dead: how do we know and what does it mean? Methods used in the comparative risk assessment of household air pollution.Annual review of public health,35, pp.185-206.