Cyber Security Risk Assessment and Mitigation Plan

Verified

Added on  2023/06/10

|5
|523
|106
AI Summary
This document outlines the risk assessment and mitigation plan for cyber security threats such as unauthorised access, data privacy and security, DoS attack, wireless security breach, and ransomware malware. It includes the type and scope of risk, mitigation actions/control measures, resources required, responsibility for mitigation actions, timeline for mitigation actions, and reporting and monitoring requirements. The plan provides preventative and contingency measures to ensure compliance with organisational procedures and cyber security legislation.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Risk treatment and implementation plan
Risk Treatment and implementation plan
Type and scope of
risk
Mitigation
Actions/control
measures
(Preventative or
Contingency)
Resources Responsibility
for mitigation
action(s)
Timeline for mitigation
action(s)
Reporting and
monitoring required
1. Unauthorised
Access
Detach the
cooperated
systems
isolate the
network
Use of VPN for
encryption
Internet
service
Networking
devices
Cloud
architecture
Ensure compliance
with organisational
procedure and
cyber security
legislation
Review the
benchmarks:
Unusual
behavior
accounts
Traffic sent
to or from
unknown
locations
(2 week)
SEIM monitoring log
is required

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Risk Treatment and implementation plan
Type and scope of
risk
Mitigation
Actions/control
measures
(Preventative or
Contingency)
Resources Responsibility
for mitigation
action(s)
Timeline for mitigation
action(s)
Reporting and
monitoring required
2. Data privacy
and security
1. Developing a
Containment Strategy
Use device
encryption
Use of VPN for
network
encryption
Use anti-malware
software (AVAST)
Use multi-factor
password
authentication
malware
Restrict the
unauthorised
access
service
Cloud
architecture
tools
IPS
Anti-
malware
tools
Deletion of
files/applica
tions
Doubtful
registry
Immoral
computer
program
(2 week)
SEIM monitoring log
is required
Document Page
Risk Treatment and implementation plan
Type and scope of
risk
Mitigation
Actions/control
measures
(Preventative or
Contingency)
Resources Responsibility
for mitigation
action(s)
Timeline for mitigation
action(s)
Reporting and
monitoring required
3. DoS attack Continuous IP
monitoring to restrict
the source
Prevent spoofing
Use device
encryption
Internet
service
architecture
VPN
Network
monitoring
tools
IPS
:
Traffic
flooding
Network
anomalies
Excessive
server
memory
consumptio
n
Timeline is set as per RPO
and RTO
(2 week)
SEIM monitoring log
is required
Document Page
Risk Treatment and implementation plan
Type and scope of
risk
Mitigation
Actions/control
measures
(Preventative or
Contingency)
Resources Responsibility
for mitigation
action(s)
Timeline for mitigation
action(s)
Reporting and
monitoring required
4. Wireless
security breach
Continuous IP
monitoring to restrict
the source
Use WPA3 and
prevent spoofing
Hide SSID
Change name of
SSID
related
vulnerable files
Use privilege
access to
resources and
Avoid vulnerable
sites and logins
Internet
service
IPS
WAP3
Subnetting
Firewalls
Networking
devices
network
configuratio
n
Anomalies
in outbound
network
traffic
Changed
access
password
and
difficulty in
connection
(1 week)
SEIM monitoring log
is required

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Risk Treatment and implementation plan
Type and scope of
risk
Mitigation
Actions/control
measures
(Preventative or
Contingency)
Resources Responsibility
for mitigation
action(s)
Timeline for mitigation
action(s)
Reporting and
monitoring required
5. Ransomware
malware
Continuous IP
monitoring to
restrict the
source
encryption
2-way verification
close vulnerable
network ports
Set strong
firewalls and
subletting
Malicious
email and
phishing
Device
failure
Inaccessibili
ty of files
and
resources
(2 week)
SEIM monitoring log
is required
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]