Risk management plan – single risk Company name: MyHealth.
Verified
Added on 2023/01/17
|2
|468
|50
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Risk management plan – single risk Company name:MyHealthCompleted by:Student name Work area:Cyber security managementDate completed:date Hazard identification Hazard:wireless network security Risk assessment What harm could the hazard cause? Because of less security in wireless network, anyone can access all the assets of the company and damage their data and information. Hackers can access the payment details and patients information for personal uses. They can sale patient’s data and information to anyone for their personal benefits. Wireless access points are situated in an open area. Therefore, anyone can configure them and access the information. What is the likelihood of this happening This threat is highly occurred in the company. It will happen because of less information and knowledge of information assets. Existing control measure Provide separate username and password to every staff member to access wireless network. All staff members are responsible for security of wireless network Physical security is necessary for wireless access points Wireless access points should have locks. ConsequenceSLE= 1,000,000 X 50% = $500,000 LikelihoodALE= SLE X ARO = 500,000 X 0.5 = 250,000 OutcomeCompany will lose their data and information because of less security and unauthorized access Control measures Detective controlsDetect virus using antivirus in the system and remove them as soon as possible Detect unauthorized access in the network using firewalls and block all that websites Corrective controlsConfigure routers and switches to secure all the network and monitoring PreventivePrevent whole network from unauthorized access of attackers using firewalls and IDS AdministrativeRestrict all the sensitive areas, such as server room Implementation Associated activitiesResources required Person(s) responsibleSign off and date Installing a firewallFirewall hardware Chief information security officer (CISO)’s name CISO signature and date Update all the antiviruses from new definitionLicence antivirusRespective personCISO signature and date Update all the operating systems from windows 10 with latest patchesWindows licence Chief information security officer (CISO)’s name CISO signature and date Configure routers and switchesRouter and switches Chief information security officer (CISO)’s name CISO signature and date REVIEW Scheduled review date:// Are the control measures in place? Yes/no based on the student assumption
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Are the controls eliminating/minimising the risk? Yes/no based on the student assumption Are there any new problems with the risk? Explain if the existing risk exceeds t the acceptable level of risk in the company Adapted from: Workplace Health and Safety Queensland – How to manage work health and safety risks code of practice. 2011