logo

Risk Assessment Report- Docs

Assess the information system vulnerabilities of the Office of Personnel Management based on a security breach report.

11 Pages1091 Words30 Views
   

Added on  2022-08-31

Risk Assessment Report- Docs

Assess the information system vulnerabilities of the Office of Personnel Management based on a security breach report.

   Added on 2022-08-31

ShareRelated Documents
Risk Assessment Report
Table of Conten
1
Risk Assessment Report- Docs_1
t
1. Introduction..................................................................................................................3
2. Approach for the Risk Assessment..............................................................................4
3. System Characterization..............................................................................................5
4. Threats.........................................................................................................................6
5. Vulnerability Statement...............................................................................................7
6. Statement for Threat....................................................................................................8
7. Risk Assessment Result...............................................................................................8
References.........................................................................................................................11
2
Risk Assessment Report- Docs_2
Risk Assessment Report
1. Introduction
1.1 Purpose
The purpose includes determining various known threats to the organization’s network
infrastructure and IT assets. The identification of various threats includes the following tasks
such as,
Identify the threat attack potential hackers on vulnerability in organization’s
information system and networks.
Identify the type of remediation and mitigation techniques.
Identify the function and purpose of firewalls for the organization’s network
infrastructure.
Discuss the value of using firewall log files, database transaction and access
control.
Identify the function and purpose of encryption.
At last, provide the recommendation for methods to remediate and mitigate the
identified vulnerabilities ("Spoofing Attack: IP, DNS & ARP", 2020).
1.2 Risk Assessment’s Scope
RAR lists the threats, vulnerabilities and pairwise comparisons for each vulnerability and
threats. It also determines the likelihood of each event occurring and impact level on the
organization.
3
Risk Assessment Report- Docs_3
2. Approach for the Risk Assessment
2.1 Participants
The participants are:
Team of Risk assessment
Network Manager
Network Security Manager
Security Administrator
Database Administrator
System Owner
System Custodian
2.2 Techniques Used
The used techniques are:
Risk assessment related questionnaire
Vulnerability sources
Assessment Tools such as Wire shark, firewalls, encryption, and auditing.
Transaction Walkthrough
Documentation Review
Site visit
2.3 Risk Model
In risk determination, the below provided model is used for risk classification,
4
Risk Assessment Report- Docs_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Devices Security: Threats, Potential Damages, and Mitigation Strategies
|6
|1897
|178

Assessing the Risks of Creating a Business Information System
|7
|855
|60

Network Security: Mitigating IP Spoofing, ARP Poisoning and DoS Attacks
|10
|1627
|213

CONVXYZ Risk Assessment
|19
|3223
|38

Network Security Tools Report
|7
|1141
|38

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57