Risk Assessment for Atlassian Corporation Plc
VerifiedAdded on 2023/05/29
|12
|1825
|357
AI Summary
The paper focuses on the cybersecurity issue of Atlassian Corporation Plc based in Sydney, Australia. It discusses the importance and limitations of risk assessment for cyber security issues in the organization. It identifies critical information assets and the impact of 5 threats on the organization. The paper ranks the threats based on their level of impact on the information assets of Atlassian.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: RISK ASSESSMENT
Risk assessment.
Name of the Student
Name of the University
Author Note
Risk assessment.
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RISK ASSESSMENT
Executive Summary
The foremost determination of the assignment is highlight the risk assessment of a selected ICT
organization which is based in Australia. The current risk assessment methods practiced in the
organization will be stated in the paper along with that the critical information assets of the
organization will be stated in the paper. The 5 threats to the assets of the organization along with
the level of impact on the chosen organizational asset will be stated in the paper. The paper will
be focusing on the ranking of the threats centered upon their impact on the critical information
asset.
Executive Summary
The foremost determination of the assignment is highlight the risk assessment of a selected ICT
organization which is based in Australia. The current risk assessment methods practiced in the
organization will be stated in the paper along with that the critical information assets of the
organization will be stated in the paper. The 5 threats to the assets of the organization along with
the level of impact on the chosen organizational asset will be stated in the paper. The paper will
be focusing on the ranking of the threats centered upon their impact on the critical information
asset.
RISK ASSESSMENT
Table of Contents
Introduction:....................................................................................................................................4
Task 1: The importance of risk assessment.....................................................................................4
Risk assessment...............................................................................................................................4
Effectiveness of Cyber security issues............................................................................................4
Difficulties to obtain the risk assessment process...........................................................................4
Effect of risk assessment results......................................................................................................5
Limitation of current risk assessment methods...............................................................................5
Task 2: Critical asset identification.................................................................................................5
Criticality of Information Asset.......................................................................................................5
Task 3: Threat identification............................................................................................................6
Task 4: Threat assessment...............................................................................................................8
Working Mechanism of each threat.................................................................................................9
Conclusion.....................................................................................................................................10
Reference.......................................................................................................................................11
Table of Contents
Introduction:....................................................................................................................................4
Task 1: The importance of risk assessment.....................................................................................4
Risk assessment...............................................................................................................................4
Effectiveness of Cyber security issues............................................................................................4
Difficulties to obtain the risk assessment process...........................................................................4
Effect of risk assessment results......................................................................................................5
Limitation of current risk assessment methods...............................................................................5
Task 2: Critical asset identification.................................................................................................5
Criticality of Information Asset.......................................................................................................5
Task 3: Threat identification............................................................................................................6
Task 4: Threat assessment...............................................................................................................8
Working Mechanism of each threat.................................................................................................9
Conclusion.....................................................................................................................................10
Reference.......................................................................................................................................11
RISK ASSESSMENT
Introduction:
The foremost determination of the paper is to focus on the cybersecurity issue of the
Atlassian Corporation Plc which is based in Sydney, Australia having around 2738 employees all
around Australia (Atlassian. 2018). The paper will be focussing on the importance and the
limitations of the risk assessment for the cyber security issues in the organization. How the
threats can impact the assets of the organization will be stated in the later unit of the paper
(Gov.uk. 2018). The ranking of the threats based on their level of impact on the information
assets of Atlassian will be discussed in final unit of the paper.
Task 1: The importance of risk assessment
Risk assessment
It is defined as the method by which the probable risks and hazard associated with an
organization can be identified.
Effectiveness of Cyber security issues
The different types of cyber security issues such as data breaches and cyber security
threats such as the ransomeware can be prevent with the help of effective cyber security risk
assessment which is done occasionally in any organization which deals with both structured and
unstructured data.
Difficulties to obtain the risk assessment process
o The entire business profit and the financial loss of the organization depends of the
efficiency of the risk assessment process.
Introduction:
The foremost determination of the paper is to focus on the cybersecurity issue of the
Atlassian Corporation Plc which is based in Sydney, Australia having around 2738 employees all
around Australia (Atlassian. 2018). The paper will be focussing on the importance and the
limitations of the risk assessment for the cyber security issues in the organization. How the
threats can impact the assets of the organization will be stated in the later unit of the paper
(Gov.uk. 2018). The ranking of the threats based on their level of impact on the information
assets of Atlassian will be discussed in final unit of the paper.
Task 1: The importance of risk assessment
Risk assessment
It is defined as the method by which the probable risks and hazard associated with an
organization can be identified.
Effectiveness of Cyber security issues
The different types of cyber security issues such as data breaches and cyber security
threats such as the ransomeware can be prevent with the help of effective cyber security risk
assessment which is done occasionally in any organization which deals with both structured and
unstructured data.
Difficulties to obtain the risk assessment process
o The entire business profit and the financial loss of the organization depends of the
efficiency of the risk assessment process.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RISK ASSESSMENT
o Accountability: The decision and laws of the organization and the industry keeps on
changing.
o Risk-ware culture (Drias, Serhrouchni and Vogel, 2015).
Effect of risk assessment results
The results of the risk assessment helps in identifying the steps which can be
implemented in the organization such as the security awareness training among the employees of
the organization, updating the patches of the operating systems of the systems used by the
stakeholders of the organization, data asset inventory and continuous vulnerability assessment
and traffic monitoring (Jokar, Arianpoo and Leung, 2016).
Limitation of current risk assessment methods
o Ever changing market conditions are the most essential limitation of the risk current
assessment process of this organization (Baig et al., 2018).
o Integrity of the risk assessment process is not maintained by the project managers.
Task 2: Critical asset identification
Criticality of Information Asset
Considered as a single entity Information Asset is a unit full of knowledge. The
information asset register is the most critical aspect of the information asset.
Identification of critical information assets can be understood by the following questions:
o Which assets have the most impact on revenue?
o Which assets have the most impact on profitability?
o Accountability: The decision and laws of the organization and the industry keeps on
changing.
o Risk-ware culture (Drias, Serhrouchni and Vogel, 2015).
Effect of risk assessment results
The results of the risk assessment helps in identifying the steps which can be
implemented in the organization such as the security awareness training among the employees of
the organization, updating the patches of the operating systems of the systems used by the
stakeholders of the organization, data asset inventory and continuous vulnerability assessment
and traffic monitoring (Jokar, Arianpoo and Leung, 2016).
Limitation of current risk assessment methods
o Ever changing market conditions are the most essential limitation of the risk current
assessment process of this organization (Baig et al., 2018).
o Integrity of the risk assessment process is not maintained by the project managers.
Task 2: Critical asset identification
Criticality of Information Asset
Considered as a single entity Information Asset is a unit full of knowledge. The
information asset register is the most critical aspect of the information asset.
Identification of critical information assets can be understood by the following questions:
o Which assets have the most impact on revenue?
o Which assets have the most impact on profitability?
RISK ASSESSMENT
o Which assets have the most impact on public image?
o Which assets is the most expensive to protect?
o Which assets is responsible for the success of the organization?
1 signifies lowest rank and 5 signifies highest rank for the following tables
Information
asset
Ranking
of the
assets
Category
of the
asset
Role of the
asset
Impact
on
revenue
Impact on
profitabilit
y
Impact
on
public
image
Trademarks
and
Copyrights
2 Intangible
asset
Authorization
of the
products
5 5 3
Brand value 1 Intangible
asset
Maintaining
strong market
relations.
5 4 5
Servers and
IS
3 Tangible
asset
Efficient
delivery of
the products
and services
3 2 3
Infrastructure 4 Tangible
asset
Efficient
utilization of
the human
resources
3 4 4
Table 1: WFA
(Source: Created by the author)
Task 3: Threat identification
Threats Asset
impacted
Threat
Agent
Metho
d of
deliver
y
Working
Mechanism
Source
Infringement Trademarks
and
Copyrights
Violators Sales of
product
s
Use of
products and
service
provided by
“Keeping competitors
away from your IP is
not only your right but
also your responsibility
o Which assets have the most impact on public image?
o Which assets is the most expensive to protect?
o Which assets is responsible for the success of the organization?
1 signifies lowest rank and 5 signifies highest rank for the following tables
Information
asset
Ranking
of the
assets
Category
of the
asset
Role of the
asset
Impact
on
revenue
Impact on
profitabilit
y
Impact
on
public
image
Trademarks
and
Copyrights
2 Intangible
asset
Authorization
of the
products
5 5 3
Brand value 1 Intangible
asset
Maintaining
strong market
relations.
5 4 5
Servers and
IS
3 Tangible
asset
Efficient
delivery of
the products
and services
3 2 3
Infrastructure 4 Tangible
asset
Efficient
utilization of
the human
resources
3 4 4
Table 1: WFA
(Source: Created by the author)
Task 3: Threat identification
Threats Asset
impacted
Threat
Agent
Metho
d of
deliver
y
Working
Mechanism
Source
Infringement Trademarks
and
Copyrights
Violators Sales of
product
s
Use of
products and
service
provided by
“Keeping competitors
away from your IP is
not only your right but
also your responsibility
RISK ASSESSMENT
the
company.
(Ipaustralia.gov.au2018)
.”
Lack of
interest
Brand value Clients Product
s
Finds
alternative
services.
“Brand equity is the
value that your brand
brings to your company.
You can measure it in a
number of ways, such as
the price premium you
can charge over a no-
name product, or long-
term customer loyalty”
Ransomewar
e
Servers and
IS
Cyber
Criminals
Private
networ
k
Data
encapsulatio
n
“ransomware is a rising
threat to businesses in
Australia and abroad”
Malware Servers and
IS
Cyber
Criminals
Private
networ
k
Data
Alteration
“Malware is the most
predominant cybercrime
threat in Australia,
according to (ACSC)”
IS
breakdown
Infrastructur
e
Internal
Stakeholder
s
Manual Human
Resources
“IS can affect
production as well as
loss of income and
customer goodwill”
Table 2: Details of the top 5 threats
Security
concepts
Security threat Incident Trend
Threats Alteration of
data
Facebook Data
Breach
July 2017
Hazards Data alternation eBay Hazard May 2014
Attacks Alternation of
personal
information
Target Stores December 2013
the
company.
(Ipaustralia.gov.au2018)
.”
Lack of
interest
Brand value Clients Product
s
Finds
alternative
services.
“Brand equity is the
value that your brand
brings to your company.
You can measure it in a
number of ways, such as
the price premium you
can charge over a no-
name product, or long-
term customer loyalty”
Ransomewar
e
Servers and
IS
Cyber
Criminals
Private
networ
k
Data
encapsulatio
n
“ransomware is a rising
threat to businesses in
Australia and abroad”
Malware Servers and
IS
Cyber
Criminals
Private
networ
k
Data
Alteration
“Malware is the most
predominant cybercrime
threat in Australia,
according to (ACSC)”
IS
breakdown
Infrastructur
e
Internal
Stakeholder
s
Manual Human
Resources
“IS can affect
production as well as
loss of income and
customer goodwill”
Table 2: Details of the top 5 threats
Security
concepts
Security threat Incident Trend
Threats Alteration of
data
Facebook Data
Breach
July 2017
Hazards Data alternation eBay Hazard May 2014
Attacks Alternation of
personal
information
Target Stores December 2013
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
RISK ASSESSMENT
Incidents Threat to
information
Uber Incident November 2016
Table 3: Details of security concepts
(Source: Created by the author)
Figure 1: Details of security concepts
(Source: Created by the author)
Task 4: Threat assessment
Asset Infringement Lack of
interest
Loss of trust Ransomeware Malware
Impact High Low Medium High High
Level of
threat
2 3 4 5 4
Effect on the
organizationa
l business
community
4 2 2 5 5
Table 4: Level of impact on Atlassian Corporation Plc
(Source: Created by the author)
Cyber security
attack Internal Threats Technological
threats
0
1
2
3
4
5
6 Cyber threats
2015 2016 2017
Incidents Threat to
information
Uber Incident November 2016
Table 3: Details of security concepts
(Source: Created by the author)
Figure 1: Details of security concepts
(Source: Created by the author)
Task 4: Threat assessment
Asset Infringement Lack of
interest
Loss of trust Ransomeware Malware
Impact High Low Medium High High
Level of
threat
2 3 4 5 4
Effect on the
organizationa
l business
community
4 2 2 5 5
Table 4: Level of impact on Atlassian Corporation Plc
(Source: Created by the author)
Cyber security
attack Internal Threats Technological
threats
0
1
2
3
4
5
6 Cyber threats
2015 2016 2017
RISK ASSESSMENT
Considering the mentioned threats, it can be stated that the ransomeware threat will be
having the highest impact on this asset as it is the only medium of communication and business
purpose for all the internal as well as the external stakeholders of this ICT organization (Knowles
et al., 2015). The mission and vision of the organization can be fully impacted by this threat.
Weakness of the
Asset
Confidentiality Integrity Association
Server Issue 3 5 2
Broken links 4 2 1
Poor design 3 4 4
Table 5: Weakness of the asset considering CIA
(Source: Created by the author)
Working Mechanism of each threat
Infringement have a least impact on official website where as lack of interest also have
no significant impact. Loss of trust have a medium impact on the website where as the
Ransomeware and Malware have the most significant impact on the selected asset of this
organization (Komninos, Philippou and Pitsillides, 2014). Threats coming from the IS
breakdown also have some impact on the selected website.
Conclusion
From the above paper, it can be concluded that the there are lots of security threats
associated with the assets of the organization. The existing risk assessment methods of the
Considering the mentioned threats, it can be stated that the ransomeware threat will be
having the highest impact on this asset as it is the only medium of communication and business
purpose for all the internal as well as the external stakeholders of this ICT organization (Knowles
et al., 2015). The mission and vision of the organization can be fully impacted by this threat.
Weakness of the
Asset
Confidentiality Integrity Association
Server Issue 3 5 2
Broken links 4 2 1
Poor design 3 4 4
Table 5: Weakness of the asset considering CIA
(Source: Created by the author)
Working Mechanism of each threat
Infringement have a least impact on official website where as lack of interest also have
no significant impact. Loss of trust have a medium impact on the website where as the
Ransomeware and Malware have the most significant impact on the selected asset of this
organization (Komninos, Philippou and Pitsillides, 2014). Threats coming from the IS
breakdown also have some impact on the selected website.
Conclusion
From the above paper, it can be concluded that the there are lots of security threats
associated with the assets of the organization. The existing risk assessment methods of the
RISK ASSESSMENT
selected organization along with its limitations is highlighted in the paper. All the threats on the
growth of the corporation can be concluded from the paper. The paper also helps in concluding
the level of impact of the threats associated with the chosen organization. The threats are ranked
according to their level of impact on certain departments of the accounting organization such as
profitability. The impact of the threats can also be concluded from the paper. The critical
information assets of the organization has been discussed in the paper along with the threat to the
information assets of the organization.
selected organization along with its limitations is highlighted in the paper. All the threats on the
growth of the corporation can be concluded from the paper. The paper also helps in concluding
the level of impact of the threats associated with the chosen organization. The threats are ranked
according to their level of impact on certain departments of the accounting organization such as
profitability. The impact of the threats can also be concluded from the paper. The critical
information assets of the organization has been discussed in the paper along with the threat to the
information assets of the organization.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RISK ASSESSMENT
Reference
Atlassian. (2018). Atlassian | Software Development and Collaboration Tools. [online] Available
at: https://www.atlassian.com/ [Accessed 6 Dec. 2018].
Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M.,
Kerai, P., Ibrahim, A., Sansurooah, K. and Syed, N., 2017. Future challenges for smart cities:
Cyber-security and digital forensics. Digital Investigation, 22, pp.3-13.
Drias, Z., Serhrouchni, A. and Vogel, O., 2015, August. Analysis of cyber security for industrial
control systems. In Cyber Security of Smart Cities, Industrial Control System and
Communications (SSIC), 2015 International Conference on (pp. 1-8). IEEE.
GOV.UK. (2018). Cyber Security Breaches Survey 2018. [online] Available at:
https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2018 [Accessed 6
Dec. 2018].
Ipaustralia.gov.au. (2018). IP Infringement | IP Australia. [online] Available at:
https://www.ipaustralia.gov.au/ip-infringement [Accessed 9 Dec. 2018].
Jokar, P., Arianpoo, N. and Leung, V.C., 2016. A survey on security issues in smart grids.
Security and Communication Networks, 9(3), pp.262-273.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Reference
Atlassian. (2018). Atlassian | Software Development and Collaboration Tools. [online] Available
at: https://www.atlassian.com/ [Accessed 6 Dec. 2018].
Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M.,
Kerai, P., Ibrahim, A., Sansurooah, K. and Syed, N., 2017. Future challenges for smart cities:
Cyber-security and digital forensics. Digital Investigation, 22, pp.3-13.
Drias, Z., Serhrouchni, A. and Vogel, O., 2015, August. Analysis of cyber security for industrial
control systems. In Cyber Security of Smart Cities, Industrial Control System and
Communications (SSIC), 2015 International Conference on (pp. 1-8). IEEE.
GOV.UK. (2018). Cyber Security Breaches Survey 2018. [online] Available at:
https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2018 [Accessed 6
Dec. 2018].
Ipaustralia.gov.au. (2018). IP Infringement | IP Australia. [online] Available at:
https://www.ipaustralia.gov.au/ip-infringement [Accessed 9 Dec. 2018].
Jokar, P., Arianpoo, N. and Leung, V.C., 2016. A survey on security issues in smart grids.
Security and Communication Networks, 9(3), pp.262-273.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
RISK ASSESSMENT
Komninos, N., Philippou, E. and Pitsillides, A., 2014. Survey in smart grid and smart home
security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials,
16(4), pp.1933-1954.
Komninos, N., Philippou, E. and Pitsillides, A., 2014. Survey in smart grid and smart home
security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials,
16(4), pp.1933-1954.
1 out of 12
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.