The objective of the report is to conduct a security risk assessment for the company MyHealth. The study discusses about each of the assets, explaining their role in the network and then lists them in a tabular format.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:RISK ASSESSMENT FOR MYHEALTH Risk Assessment for MyHealth Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1RISK ASSESSMENT FOR MYHEALTH Summary The objective of the report is to conduct a security risk assessment for the company MyHealth. The study discusses about each of the assets, explaining their role in the network and then lists them in a tabular format. Thereafter the Information Security governance for the company is talked about which suggests why and how it can be beneficial for MyHealth. Next the cybersecurity policies are explained suggestions provided for MyHealth. The report then proceeds to talk about Enterprise risk management and explains the steps after which the vulnerability assessment table is given. After explaining assets, threats, vulnerabilities and risks, the risk assessment table is created. The report then ends with concluding notes by providing observations from the assessment.
2RISK ASSESSMENT FOR MYHEALTH Table of Contents Introduction................................................................................................................................3 Discussion..................................................................................................................................3 Task 1 Asset Identification.....................................................................................................3 The different information assets of MyHealth are:............................................................3 Information Security Governance and MyHealth............................................................10 Cybersecurity policies for MyHealth...............................................................................11 Task 2 Vulnerability Management and risk management....................................................12 Enterprise Risk Management...........................................................................................12 Vulnerabilities in assets of MyHealth..............................................................................13 Asset.................................................................................................................................17 Threat...............................................................................................................................17 Vulnerability....................................................................................................................17 Risk..................................................................................................................................17 Conclusion................................................................................................................................19 Bibliography.............................................................................................................................20
3RISK ASSESSMENT FOR MYHEALTH Introduction The report concerns with carrying out the security risk assessment for the company MyHealth which involves clinical practise in the field of cancer related research. It is clear that the company deals with sensitive data and hence they are looking to secure their practises by evaluating a security risk assessment of their company. As part of the risk assessment the report is responsible for identifying and briefing on the assets of the network and classifying them in a table (Kott and Arnold 2015). After that the report discusses on how and why information security governance can be beneficial for the company and following which cybersecurity policies are explained and suggestions are given for MyHealth. Then the report enters vulnerability and risk management section by explaining enterprise risk management and the steps. Next the vulnerabilities for each of the assets are identified and presented in the vulnerability assessment table and thereafter assets, threats, vulnerabilities and risk are explained. After that the risk assessment table is created and concluding notes are given. Discussion Task 1 Asset Identification The different information assets of MyHealth are: Email Server:Email servers also called mail servers, are applications or computers placed in a network the purpose of which is acting as virtual post offices. The servers store incoming mails as also distribute them to the local users and are responsible for sending outgoing messages. They use client-server applications for sending and receiving messages via the Simple Mail Transfer Protocol (SMTP) protocol. Email servers can also be called mail and message transfer agents. Web server:Webserversare programs make use of Hypertext Transfer Protocol (HTTP) so they can serve files that form the web page, as response against user requests. These web
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4RISK ASSESSMENT FOR MYHEALTH pages get forwarded through the HTTP clients of the computers. Computers and applications dedicated for such tasks are also called web servers. Database Server:Database server refers to hardware as well as software solutions used for running databases as per requirements. The software side database servers act as back ends of databases following client-server model. These back end portions are at times called instances. These can also be physical computers used for hosting databases. These are generally high-end computers that are dedicated for database purposes only. DHCP and DNS server:Although both DNS and DHCP work using theclient-server architecturethey are completely different.DNSis used for mapping domain names to IP addresses whiletheDHCPprotocol assigns IPs to hosts present in the network through static or dynamic methods. Even for configuring the DNS server with hosts the DHCP used. ADSL router:Configuring WiFi ADSL Routers can be done in a matter of minutes so that the Internet connection can be shared. Sharing of hard drives, files and printers can be performed from any place within the WiFi range or through wired Ethernet connections via any of the Ethernet ports found at the back of WiFi ADSL routers. Because of having built-in ADSL modem, the ADSL routers can plug directly with the telephone line through micro- filters. Workstations:Workstations are computers dedicated to users or a user group of businesses for performing professional tasks. These systems include displays with high display resolutionsand much faster processorsthan regular personal computers(PC). Workstations also have higher multitasking capabilities owing to the additional amount of random-access memory (RAM), hard drives and hard drive capacities. Workstations can also possess graphics adapters relatively faster than regular PCs as also have more peripheral connections.
5RISK ASSESSMENT FOR MYHEALTH Operating system:Operatingsystemsincomputersareamongthemostimportant components of computers. Almost all computers including cellular telephones need operating systems for operating as intended. Operating systems allow users to work with the computer without the need of understanding how computers work. Firewall:firewalls are security systems that use predetermined set of rules for analysing and controlling traffic going in and out of the network. In other words, firewalls serve as gatekeeperswhichkeepmaliciousprogramsandvirusesawayfromthenetworkfor preventing breach of data. Telnet connection:The Telnetprotocol is used for providing communication through the Internet or a LAN by using virtual terminal connections. This isby default installed on Linux and old Mac operating systems but has to be separately installed on windows based operating systems and macOS High Sierra 10.13 or later. Wireless Access Points:In wireless local area networks (WLAN), every access point is the station that transmits and receives data (transceivers). Wireless access points connect one user with another in the network, also serving like interconnects between WLAN and the wired network. Wireless access points are used for serving multiple users in specified network areas. When people exit the range of an access point, they automatically get connected to the next. Small WLANs might only be requiring a single wireless access point but the number increases proportionally with the number of network users and the network size. Number Asset IDAssetAsset Location OwnershipAsset Description
6RISK ASSESSMENT FOR MYHEALTH 1R.01Email serverServers installedin MyHealth The companyEmailservers alsocalled mailservers, are applications orcomputers placedina networkthe purposeof whichis actingas virtualpost offices. 2R.02Web serverServers installedin MyHealth The companyWebserversa reprograms thatusethe HTTP protocolto serve the files formingthe webpage,as response againstuser requests. 3R.03DatabaseServersThe companyDatabase
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7RISK ASSESSMENT FOR MYHEALTH serverinstalledin MyHealth serverrefers to hardware as wellas software solutions used forrunning databasesas per requirements. 4R.04DHCPand DNS server Servers installedin MyHealth The companyDNSisused formapping domain names toIP addresses whilethe DHCPprotoc ol assigns IPs tohosts present in the network throughstatic ordynamic methods. 5R.05ADSL RouterNetworkThe companyHavingbuilt-
8RISK ASSESSMENT FOR MYHEALTH components of MyHealth inADSL modem,lets ADSL routers plugdirectly withthe telephone line through micro-filters. 6R.06WorkstationsWorkstations in MyHealth The companyWorkstations are computers dedicatedto users or a user groupof businesses for performing professional tasks. 7R.07Operating system Computers and workstations The companyOperating systems allow users to work withthe computer withoutthe needof
9RISK ASSESSMENT FOR MYHEALTH understanding how computers work. 8R.08FirewallsServersand clientsin MyHealth The companyFirewallsare security systemsthat use predetermined set of rules for analysingand controlling trafficgoing in and out of the network. 9R.09Wireless Access point Network components in MyHealth The companyAccesspoints connectusers withother usersinthe networkand can also serve as interconnects between
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10RISK ASSESSMENT FOR MYHEALTH WLANand thewired network. 10R.10Telnet connection Client computers The companyThe Telnetprotoco lisusedfor providing communicatio n through the Internetora LAN by using virtual terminal connections. Information Security Governance and MyHealth A multitude of compliance and legislative requirements on IT security mandate overseeing of how information security issues ae addressed by institutions. They need to adherebythegovernanceframeworktomeettheseregulations.InformationSecurity Governance concerns with identifying and ranking of risks that are most critical to the business and to provide means for monitoring information-related access controls and data integrity violations.
11RISK ASSESSMENT FOR MYHEALTH This formal approach makes Information Security Governance extremely essential for MyHealth where all the IT staff help manage information security in a generic way without defined roles. The above-mentioned approach alleviates this problem. Cybersecurity policies for MyHealth Cyber security policies outline assets that are needed to be protected, threats to these assets as also controls and rules for protecting the members and the business. The policy must tell the users and employees of the respective responsibilities for protecting technologies and information assets of the business. Among these issues are: Type of business information to be shared Agreed upon usage policy of materials and devices Handling and storing sensitive material Policies to secure operations of MyHEalth can be: 1.Authentication:Havingsegmentedaccesslevelsforthedifferentbusiness processes of MyHealth secured with passwords which should only be known to the domain personnel and the IT staff and should be updated periodically. 2.Emailing standards: These should include opening of email attachments from trusted businesses and contacts. Blocking of spam and junk emails and deleting suspicious mail. 3.Locking of computers: The users must not forget to shut down the computers and mobile after the day’s work and locking computer screen if not being used.
12RISK ASSESSMENT FOR MYHEALTH Task 2 Vulnerability Management and risk management Enterprise Risk Management Enterprise risk management (ERM) refers to plan-based strategies which aim to identify, prepare as also assess the hazards, dangers or other potentials for disaster both physically and figuratively. Though this might interfere with organizational objectives and operations. This discipline not just suggests corporations for identifying the risks faced and which to address readily, but also makes the action plan available for all the stakeholders. Step 1 – Establish an Enterprise Risk Structure Corporate risk registers should look different from the operational risk register, with greater focus towards risks on reputation, business strategy among others.This risk structure must be matching the organisation’s structure both vertical and horizontal. Step 2 –Assign responsibility Assigning ownership and responsibility has to be straightforward. The selected portions of the structure to have the concerned objectives worked out and be grouped with associatedmanagers(functional,businessorexecutive)whoshouldbeachievingthe objectives and manage associated risks. Step 3 – Creating enterprise risk maps Enterprise risk map can be created by: List of global categories for communicating information to right places Setting relations between the risks like (parent, sibling, child) Scoring mechanisms having common and consistent types of impact
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13RISK ASSESSMENT FOR MYHEALTH Step 4 – Decision making and enterprise risk reporting Among the critical aspects of managing risks are executing necessary actions for managing the risks. Reporting across the enterprise so as to allow senior managers to review risk exposures across organisation. This can be greatly achieved by metrics reports like risk histograms. Step 5 – Moving from local to enterprise culture Business and functional based risk management must be initiated by means of risk steering groups comprising managers and functional leads. The benefits are in uniting to gain understanding on inter-discipline risks and help in eliminating stove-piping of processes. This may enable inter discipline discussions focussing on how to align personal and business objectives which generally leads towards dramatic progress on managing risks. Also, the senior management must be engaged in ensuring changes to the organisational culture. Vulnerabilities in assets of MyHealth Asset(10assets shouldbe provided) VulnerabilityThreatAnalysis Email Server:SMTPServer Listening on Non- Default Port Backdoor attackCountsas ‘Medium’risk vulnerabilityand is often found in networks throughoutthe world.Theissue waspresentfor
14RISK ASSESSMENT FOR MYHEALTH decades but were difficult to detect Web server:Cross-Site Scripting (XSS) Systeminfection frommalicious codes Thewebserver vulnerability whichallows hackersin injectingclient- sidescriptsinto web pages. When normal users visit websites,which display susceptible contentslike dynamicweb pages, attacks can alsouseharmful codes to infect the user. Database Server:Thisvulnerability is present in Java VirtualMachine (JVM) component inOracle Database Servers. Hacking,JVM takeover Forsuccessful attacks,human interactions people except the attacker
15RISK ASSESSMENT FOR MYHEALTH Versionsaffected bythis vulnerabilityare 11.2.0.4,12.1.0.2 and12.2.0.1. protocolsfor compromising JVM. DHCPandDNS server: PowerDNS Authoritative Server before both the 4.0.7 and 4.1.7 versions. DoS attackVulnerability was modifiedsince lastanalysisby theNVD. Awaiting reanalysis. ADSL routerTelindus1100 ADSL routers allowremote attackerstogain privilegestothe deviceviaa certainpacketto UDP port 9833 Authenticationis notrequiredto exploitthe vulnerability. WorkstationsIntegeroverflow vulnerabilityin VMwareNAT service when IPv6 mode is enabled. usedtoexecute code on the host in conjunctionwith other issues. Vulnerability validwhen productversions olderthan VmwareFusion
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16RISK ASSESSMENT FOR MYHEALTH 8.5.1usedwith Apple Mac OS X Operating systemWindowsJet DatabaseEngine improperly handl Remoteexecution ofmalicious codes. Affectsawide range of Windows OS. FirewallsCheckPoint Firewall:1 4.1- NG AI R55 Allowaremote attackertosteal sensitive information. CWEidisnot definedforthis vulnerability WirelessAccess point IPVersion4 (IPv4)fragment reassembly function DoSattack, constant reboots Thevulnerability resultsfrom corruptionof internaldata structureand affectsmost wirelessLAN controllers. Telnet connectionslc_add_reply function Buffer overflowCWE id not yet definedforthe vulnerability. Asset When it comes to computer and network security, anassetis any device, application, data, device or many other components which support information0specific activities. These typically include hardware like servers, switches, software (be it mission critical applications
17RISK ASSESSMENT FOR MYHEALTH or supporting systems) and confidential information. These assets need to be protected from misuse, illicit access, unauthorized disclosure, modification, deletion or even theft leading to loss for the organization. Threat Intheworldofcomputersecurity,threatsaredangerousandmightexploit vulnerabilities for breaching security thus causing damages often irreparable. Threats can eitherbeintentionallikehackingby individualcrackersorcriminalorganizationsor accidental like malfunctioning of computers. Vulnerability Vulnerabilities incomputersarecybersecurityterms which refer to defects in any given system and can leave it open for attacks (Knowles et al. 2015). Network personnel and computer users must stay aware and informed on currentvulnerabilitiesin every software in use and explore ways to remain protected against them. Risk Risks as well as opportunities in cybersecurity that devices, digital media and technologies help come forth.Cyber risks were never purely for IT teams only, despite of them playing vital roles. The risk management functions of organizations require thorough understanding of the rapidly evolving risks and continue to explore tools and techniques for addressing them. ThreatVulnerabilityLikelihoodImpactRisk ratingDescription
18RISK ASSESSMENT FOR MYHEALTH DoS attackPowerDNS Authoritative Serverbefore both the 4.0.7 and4.1.7 versions. LikelyMajor16(Extreme)Threatis likelyto occur despite firewalland hasmajor impacton systems Remote execution of malicious codes. Integer overflow vulnerability Almost certain Moderate15(High)Threatis definitelyto occur but has moderate impact Backdoor Attack SMTPServer Listeningon Non-Default Port PossibleMajor12(High)Threatmight occur and has major impact
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19RISK ASSESSMENT FOR MYHEALTH Conclusion In conclusion the report succeeds in conducting a risk assessment for MyHealth by identifying and providing briefs on the assets following which they are classified in a tabular format where the report provides location and ownership specific details. After thatthe report discusses on how and why information security governance can be beneficial for the MyHealth and following which cybersecurity policies are explained and suggestions are given for the company where it is observed that the way MyHealth addresses security incidents needs a revamp. Next the report proceeds to the vulnerability and risk management section where enterprise risk management strategy is explained and the five steps are given afterwhichthvulnerabilityassessmenttableismaderelatingtheassetswiththeir vulnerabilities and threats that might occur. Then after explaining about asset, threat, vulnerability and risks, the risk assessment table is created. It is observed that DoS attack, remote execution of malicious codes and backdoor attacks are the most critical threats to be faced by MyHealth. Bibliography Chen, M.H., Dong, M. and Liang, B., 2016, March. Joint offloading decision and resource allocation for mobile cloud with computing access point. In 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp. 3516-3520). IEEE. Chiu, D., Weng, S.H. and Chiu, J., 2017. Backdoor use in targeted attacks.A Trend Micro Research Paper.
20RISK ASSESSMENT FOR MYHEALTH Dukhovni, V. and Hardaker, W., 2015.SMTP Securityvia OpportunisticDNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)(No. RFC 7672). Ganin, A.A., Quach, P., Panwar, M., Collier, Z.A., Keisler, J.M., Marchese, D. and Linkov, I.,2017.Multicriteriadecisionframeworkforcybersecurityriskassessmentand management.Risk Analysis. Gruss, D., Maurice, C. and Mangard, S., 2016, July. Rowhammer. js: A remote software- induced fault attack in javascript. InInternational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment(pp. 300-321). Springer, Cham. Heo, H. and Shin, S., 2018, May. Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning. InProceedings of the 2018 on Asia Conference on Computer and Communications Security(pp. 625-636). ACM. Hoyt, R.E. and Liebenberg, A.P., 2015. Evidence of the value of enterprise risk management. Journal of Applied Corporate Finance,27(1), pp.41-47. Hubbard, D.W. and Seiersen, R., 2016.How to measure anything in cybersecurity risk. John Wiley & Sons. Hydara, I., Sultan, A.B.M., Zulzalil, H. and Admodisastro, N., 2015. Current state Jones, B., Feamster, N., Paxson, V., Weaver, N. and Allman, M., 2016, March. Detecting DNSrootmanipulation.InInternationalConferenceonPassiveandActiveNetwork Measurement(pp. 276-288). Springer, Cham. Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber securitymanagementinindustrialcontrolsystems.Internationaljournalofcritical infrastructure protection,9, pp.52-80.
21RISK ASSESSMENT FOR MYHEALTH Kott, A. and Arnold, C., 2015. Towards Approaches to Continuous Assessment of Cyber Risk in Security of Computer Networks.arXiv preprint arXiv:1512.07937. Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs moreholisticapproach:Aliteraturereview.InternationalJournalofInformation Management,36(2), pp.215-225. Szewczyk, P. and Macdonald, R., 2017. Broadband router security: History, challenges and future implications. Younes, O.S., 2016. A Secure DHCP Protocol to Mitigate LAN Attacks.Journal of Computer and Communications,4(01), p.39. Zhang, H., Cheng, P., Shi, L. and Chen, J., 2016. Optimal DoS attack scheduling in wireless networkedcontrolsystem.IEEETransactionsonControlSystemsTechnology,24(3), pp.843-852.